IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

08/11/2024 0 Comments 0 tags

High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The

Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective

08/11/2024 0 Comments 0 tags

Let’s face it—traditional security training can feel as thrilling as reading the fine print on a software update. It’s routine, predictable, and, let’s be honest, often forgotten the moment it’s

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

08/11/2024 0 Comments 0 tags

Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The

CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability

08/11/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence

A Hacker’s Guide to Password Cracking

07/11/2024 0 Comments 0 tags

Defending your organization’s security is like fortifying a castle—you need to understand where attackers will strike and how they’ll try to breach your walls. And hackers are always searching for

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

07/11/2024 0 Comments 0 tags

A threat actor with ties to the Democratic People’s Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity

Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers

07/11/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up thousands of downloads for over three years while stealthily exfiltrating developers’ Amazon Web

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

07/11/2024 0 Comments 0 tags

The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the European Union, marking the first time the hacking crew has targeted an organization in

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims

07/11/2024 0 Comments 0 tags

An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is

5 Most Common Malware Techniques in 2024

07/11/2024 0 Comments 0 tags

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber