Threats
Cyberattacks on User Logins Soar 156% as Infostealers and Phishing Kits Drive Surge
The cybersecurity threat landscape has undergone a dramatic transformation, with identity-based attacks now dominating as the primary vector for cybercriminals.According to recent threat...
Threat Actors Exploit AV/EDR Evasion Framework to Deploy Malware in the Wild
Elastic Security Labs has identified multiple financially motivated malware campaigns leveraging the commercial AV/EDR evasion framework, SHELLTER.Originally designed as a legitimate tool for sanctioned...
FUNNULL Threat Actors Leverage Amazon and Microsoft Cloud Services to Obscure Attack Infrastructure
A new report from Silent Push Threat Analysts has revealed that numerous Western companies, including tech giants like Amazon, Microsoft, and Meta, may still...
TGR-CRI-0045 Threat Actors Exploit IIS Machine Key Compromise to Breach Organizations
Unit 42 researchers have uncovered a sophisticated campaign led by an initial access broker (IAB) exploiting leaked Machine Keys—critical cryptographic keys used on ASP.NET...
XwormRAT Operators Hide Malicious Code Within Legitimate Software for Stealthier Attacks
Security researchers at AhnLab Security Intelligence Center (ASEC) have identified a sophisticated malware campaign utilizing steganography techniques to distribute XwormRAT, a remote access trojan...