Cybersecurity Threats | Malware Development | Vulnerability Exploitation Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.
Cybersecurity Threats | Malware Distribution | Social Engineering Attacks Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.
Credential Theft | Cybersecurity Threats | Phishing Campaign APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.
Evasion Strategies | Exploitation Techniques | Malware Threats Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.
Cybersecurity Threats | Incident Response Challenges | Ransomware Tactics A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.
Cybercrime | Data Theft | Malware Techniques A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.
Cybersecurity The PlayPraetor Android Trojan has infected over 11,000 devices by using counterfeit Google Play pages and advertisements on Meta.