Category: CyberSecurityNews

Red Teaming C2 Frameworks
19
Sep
2024

Open Source C2 Frameworks Used In Red Teaming Vulnerable To RCE Attacks

A C2 framework is an architecture that controls and maintains access to compromised systems. Its purpose is to allow you…

Hackers Using Supershell Malware To Attack Linux SSH Servers
19
Sep
2024

Hackers Using Supershell Malware To Attack Linux SSH Servers

Supershell is a command-and-control (C2) remote control platform that operates through web services. It allows users to establish a reverse…

Fox Kitten's Hidden Infrastructure & New IOCs Uncovered
19
Sep
2024

Fox Kitten’s Hidden Infrastructure & New IOCs Uncovered

Fox Kitten (aka Pioneer Kitten or Parisite) is an Iranian cyber threat group that has been active since at least…

Attention Travelers! Beware of Booking.com Themed Phishing Attacks
19
Sep
2024

Attention Travelers! Beware of Booking.com Themed Phishing Attacks

Phishing attacks are a type of social engineering scam where attackers trick victims into revealing sensitive information.  In phishing attacks,…

Why Cynet’s All-in-One Platform Is a Game-Changer for MSPs
19
Sep
2024

Why Cynet’s All-in-One Platform Is a Game-Changer for MSPs

Managed Services Providers (MSPs) are increasingly looking to provide cybersecurity services based on heightened demand from their current clients. Though…

Splinter: New Post-Exploitation Red Team Tool Discovered
19
Sep
2024

Threat Actors Weaponized Splinter Post-Exploitation Red Team Tool Discovered

Unit 42 cybersecurity researchers have identified a new post-exploitation red team tool, Splinter, using Advanced WildFire’s memory scanning tools. This…

New Raptor Train Botnet Hacked 200,000+ Devices WorldWide
19
Sep
2024

New Raptor Train Botnet Hacked 200,000+ Devices WorldWide

A botnet is a network of compromised devices, such as computers and IoT devices, infected with malware and controlled by…

What is Botnet?
19
Sep
2024

What is Botnet? How it Works, Definition & Types

A botnet, short for “robot network,” is a collection of internet-connected devices, including computers, servers, mobile devices, and Internet of…

Aembit Unveils 2024 Survey Report Highlighting Major Gaps in Securing Non-Human Identities
19
Sep
2024

Aembit Unveils 2024 Survey Report Highlighting Major Gaps in Securing Non-Human Identities

Aembit, the non-human identity and access management (IAM) company, today released its 2024 Non-Human Identity Security Report, a definitive survey…

Tor Claims Network is Safe Amid Law Enforcement Infiltration
19
Sep
2024

Tor Claims Network is Safe Amid Law Enforcement Infiltration

The Tor Project has responded to recent reports that law enforcement agencies in Germany have successfully infiltrated the Tor network…

CISA Warns of Five Vulnerabilities Actively Exploited in the Wild
19
Sep
2024

CISA Warns of Five Vulnerabilities Actively Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding five critical vulnerabilities that are being actively…

SambaSpy Attacking Windows Users With Weaponized PDF Files
19
Sep
2024

SambaSpy Attacking Windows Users With Weaponized PDF Files

Threat actors often make use of weaponized PDF files as they enable them to deliver malware and execute attacks through…