Category: CyberSecurityNews
Recently, security researchers have discovered that cybercriminals are distributing harmful Python packages that are camouflaged as genuine obfuscation tools, but…
SideCopy, the Pakistani-based threat actor, has been using the WinRAR vulnerability (CVE-2023-38831) to target Indian government entities for delivering multiple…
Lenovo has disclosed multiple BIOS security vulnerabilities affecting several vendors in their new security advisory. The potential impacts of these…
Recently, two significant vulnerabilities related to memory corruption have been uncovered in the popular VLC media player. These vulnerabilities were…
PDF files are commonly used for their versatility, making them a prime target for malware delivery because they can embed…
Cyber forensic tools play a crucial role in cyber investigations by helping investigators collect, analyze, and preserve digital evidence. These…
State-sponsored hackers or threat actors and their cyber operations are evolving at an alarming pace, leveraging advanced techniques and constantly…
Threat actors can potentially exploit ChatGPT to generate convincing phishing emails or deceptive content encouraging users to download malware. They…
It is getting better and better that modern security tools can protect companies’ networks and endpoints from hackers. But sometimes,…
Google Calendar RAT (GCR) is a proof of concept for Command & Control (C2) via Google Calendar Events. It’s useful…
Threat intelligence is essential for cybersecurity, as it provides organizations with a clear view of the current threat landscape and…
Researchers point out that APTs (Advanced Persistent Threats) cause financial harm to organizations. For APT modeling, provenance graphs may be used…