Cybersecurity Threats | Malware Exploitation | Ransomware Attacks Cybercriminals are utilizing legitimate drivers to disable antivirus programs and weaken the security measures of a system.
Cybersecurity Threats | Malware Evasion Techniques | Ransomware Deployment Strategies HeartCrypt’s EDR Killer Tools called ‘AVKiller’ are currently being utilized in ransomware attacks.
Bug Bounty Programs | Cybersecurity Threats | HTTP Vulnerabilities Recent HTTP request smuggling attacks have affected content delivery networks (CDNs), large organizations, and millions of websites.
AI Exploitation Techniques | Cybersecurity Threats | Smart Home Vulnerabilities Gemini compromised through a prompt injection in a Google Calendar invitation
Cybersecurity Threats | Malware Distribution Methods | Phishing Techniques Cybercriminals are exploiting SVG files by embedding harmful JavaScript to deploy malware on Windows systems.
Cybersecurity Threats | Data Breach | Personal Information Air France and KLM Notify Authorities About Data Breach Incident
Cybersecurity Threats | Malicious Software | Supply Chain Attacks WhatsApp developers are facing threats from malicious npm packages that come with a remote kill switch.
Command and Control Techniques | Cybersecurity Threats | Web Conferencing Exploits Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.
Cybersecurity Threats | Malware Development | Ransomware Evolution The ScarCruft hacker group has initiated a new malware campaign that utilizes Rust programming language and the PubNub service.
Cybersecurity Threats | Global Espionage | Malware Techniques Advanced DevilsTongue Windows spyware monitors users around the world.
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.
Advanced Persistent Threats | Cybersecurity Threats | Malware Distribution Techniques Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Google’s Salesforce accounts have been compromised in a continuing cyber attack, resulting in the theft of user information by hackers.
Cybersecurity Threats | Ethereum Scams | Smart Contract Obfuscation Malicious actors exploit smart contracts to siphon over $900,000 from user cryptocurrency wallets.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Salesforce instances at Google have been compromised in a continuing attack, resulting in hackers stealing user information.
Cybersecurity Threats | Phishing and Social Engineering Techniques | Remote Monitoring and Management Exploitation Threat actors are exploiting Remote Monitoring and Management (RMM) tools to gain control of systems and extract sensitive information.
Cybersecurity Threats | Malware Development | Vulnerability Exploitation Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.
Cybersecurity Threats | Malware Distribution | Social Engineering Attacks Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.
AI Infrastructure Vulnerabilities | Cybersecurity Threats | Malware Analysis The frequency of cyber attacks targeting AI infrastructure is increasing, with significant vulnerabilities being identified.
Credential Theft | Cybersecurity Threats | Phishing Campaign APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cybersecurity Threats | Mitigation Strategies | Vulnerability Management SonicWall has issued a warning about a rise in cyberattacks aimed at their Generation 7 firewalls over the past 72 hours.
Cybersecurity Threats | Remote Code Execution | Vulnerability Exploitation Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.
Cybersecurity Threats | E-commerce Fraud | Phishing and Malware Campaigns A campaign utilizing artificial intelligence has created 15,000 counterfeit TikTok Shop websites that distribute malware and steal cryptocurrency.
Cybersecurity Threats | Ransomware Attacks | Vulnerability Investigation SonicWall is looking into a possible zero-day vulnerability in its SSL VPN following reports of over 20 targeted attacks.
Cybersecurity Threats | Malicious Software Techniques | Supply Chain Vulnerabilities Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.
AI in Cyber Operations | Cybersecurity Threats | Evolving Tactics Threat actors are increasingly utilizing generative AI tools.
Cybersecurity Threats | Incident Response Challenges | Ransomware Tactics A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.
Cybersecurity Threats | Ransomware Attacks | Vulnerability Exploitation SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.