Cybercrime Operations | Malware Distribution | Traffic Distribution Systems SocGholish malware is distributed through advertising tools and provides access to various groups such as LockBit and Evil Corp.
Cross-Platform Vulnerabilities | Malicious Software | Supply Chain Risks Malicious Go and npm packages are spreading cross-platform malware that can initiate remote data erasure.
Command and Control Techniques | Cybersecurity Threats | Web Conferencing Exploits Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.
Credential Harvesting | Remote Access Tools | Social Engineering Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.
Advanced Persistent Threats | Cybersecurity Threats | Malware Distribution Techniques Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cyber Warfare | Malware Development | Phishing Attacks UAC-0099 Hackers Exploiting HTA Files to Distribute MATCHBOIL Loader Malware
Cybersecurity Threats | Malware Development | Vulnerability Exploitation Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.
Cybersecurity Threats | Malware Distribution | Social Engineering Attacks Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.
Credential Theft | Cybersecurity Threats | Phishing Campaign APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.
Evasion Strategies | Exploitation Techniques | Malware Threats Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.
Cybersecurity Threats | Incident Response Challenges | Ransomware Tactics A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.
Cybercrime | Data Theft | Malware Techniques A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.
Cybersecurity The PlayPraetor Android Trojan has infected over 11,000 devices by using counterfeit Google Play pages and advertisements on Meta.