LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

20/11/2023 0 Comments 0 tags

The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry to evade detection and exfiltrate valuable information from infected hosts.

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

20/11/2023 0 Comments 0 tags

Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords and gain unauthorized access to a multitude of

Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years

20/11/2023 0 Comments 0 tags

An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillance, and disruptive operation for over a decade. The Appin Software

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

18/11/2023 0 Comments 0 tags

The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

18/11/2023 0 Comments 0 tags

Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in attacks targeting Ukrainian entities. Check Point, which detailed Gamaredon’s (aka Aqua Blizzard,

Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware

17/11/2023 0 Comments 0 tags

Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as WinSCP into installing malware instead. Cybersecurity company

FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks

17/11/2023 0 Comments 0 tags

The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams that make it possible for malicious actors to orchestrate SIM-swapping

Discover 2023’s Cloud Security Strategies in Our Upcoming Webinar – Secure Your Spot

17/11/2023 0 Comments 0 tags

In 2023, the cloud isn’t just a technology—it’s a battleground. Zenbleed, Kubernetes attacks, and sophisticated APTs are just the tip of the iceberg in the cloud security warzone. In collaboration

27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT Experts

17/11/2023 0 Comments 0 tags

An unknown threat actor has been observed publishing typosquat packages to the Python Package Index (PyPI) repository for nearly six months with an aim to deliver malware capable of gaining

U.S. Cybersecurity Agencies Warn of Scattered Spider’s Gen Z Cybercrime Ecosystem

17/11/2023 0 Comments 0 tags

U.S. cybersecurity and intelligence agencies have released a joint advisory about a cybercriminal group known as Scattered Spider that’s known to employ sophisticated phishing tactics to infiltrate targets. “Scattered Spider threat actors