Category: CyberSecurityNews

Hackers Use Steganography Method To Hide Malware In PNG File
27
Feb
2024

Hackers Use Steganography Method To Hide Malware In PNG File

Steganography is employed by threat actors to hide malicious payloads in benign files such as pictures or documents.  By using…

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours
27
Feb
2024

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours

The current large surge in cyber threats has left many organizations grappling for security, so ThreatHunter.ai is taking decisive action….

21 New Malware Variants Targeting Mac Users Identified
27
Feb
2024

21 New Malware Variants Targeting Mac Users Identified

The “Security 360: Annual Trends Report 2024” provides a comprehensive overview of the evolving cybersecurity landscape, focusing on device risks,…

Authorities Dismantled SugarLocker Ransomware Group
26
Feb
2024

Authorities Dismantled SugarLocker Ransomware Group

Russian authorities have successfully dismantled a notorious ransomware gang known as SugarLocker, arresting three of its alleged members. The group,…

Xeno RAT Abuses Windows DLL Search To Avoid Detection
26
Feb
2024

Xeno RAT Abuses Windows DLL Search To Avoid Detection

A new sophisticated malware, which is written in C# and has sophisticated functionalities, has been discovered. This new malware has…

Hackers Hijack Websites to Inject Malware that Steals Credentials
26
Feb
2024

Hackers Hijack Websites to Inject Malware that Steals Credentials

Concerning a development for internet security, a new form of website malware known as “Angel Drainer” has been increasingly targeting…

21 New Malware Families Detected Attacking Mac Users
26
Feb
2024

21 New Malware Families Detected Attacking Mac Users

The upsurge of Apple products has made Mac users the prime targets for hackers who use malware to exploit them. …

Automated AI Toolkit For Security Professionals
25
Feb
2024

Automated AI Toolkit For Security Professionals

A new Python automation framework has been released for risk identification in generative AI. This new framework has been named…

Windows Malware Dropped From Fake Software Developers Job Offers
24
Feb
2024

Windows Malware Dropped From Fake Software Developers Job Offers

February 24, 2024 – Phylum, a leader in cybersecurity research, has unveiled a sophisticated malware campaign aimed at software developers…

Hijacked PyPI Package Installs NovaSentinel Stealer on Windows
24
Feb
2024

Hijacked PyPI Package Installs NovaSentinel Stealer on Windows

Researchers identified a sophisticated cyberattack through a dormant Python Package Index (PyPI) package named Django-log-tracker, which was unexpectedly updated to…

Surge In Attacks Exploits User Credentials To Hack Enterprises
24
Feb
2024

Surge In Attacks Exploits User Credentials To Hack Enterprises

There are currently billions of compromised credentials available on the Dark Web, making it the easiest route for criminals to…

Researchers Unveild Apple’s Shortcuts Vulnerability
24
Feb
2024

Researchers Unveild Apple’s Shortcuts Vulnerability

Researchers uncovered the vulnerability in Apple’s Shortcuts application, which could leave users’ privacy at risk. This vulnerability highlights the importance…