BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

29/03/2025 0 Comments 0 tags

In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus

CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection

28/03/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that’s designed to download and execute secondary payloads. The malware, according to Zscaler ThreatLabz, shares behavioral similarities with

Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA

28/03/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited by a bad actor to seize control

Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity

28/03/2025 0 Comments 0 tags

Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity

PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps

28/03/2025 0 Comments 0 tags

An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps. “PJobRAT

Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability

28/03/2025 0 Comments 0 tags

Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts

28/03/2025 0 Comments 0 tags

Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables from compromised systems. “Some of these packages

New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records

27/03/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System (DNS) mail exchange (MX) records to serve fake login pages that impersonate about

Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks

27/03/2025 0 Comments 0 tags

A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa, BianLian, and Play. The connection stems from the use of a custom tool that’s

APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware

27/03/2025 0 Comments 0 tags

An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India’s public sector postal system as part of