Category: CyberSecurityNews

Rhadamanthys Stealer Delivered Via a Spam Email
17
Jan
2023

New Infostealer Malware Spreading Through Google Ads

Cyble Research & Intelligence Labs (CRIL) discovered a brand-new malware variant called “Rhadamanthys Stealer.” This malware stealer variation is now…

CIA's Hive Multi-Platform Attack Kit
17
Jan
2023

Threat Actors Using Leaked CIA’s Hive Multi-Platform Attack

It has been reported that a group or individual, whose identity is currently unknown, has released a new “backdoor.” This…

Hackers Use VPN Installers
16
Jan
2023

Hackers Use VPN Installers To Install Surveillanceware Device

The consumer VPN market has seen explosive growth in the last few years due to the increasing popularity of VPN…

Digital Certificates
16
Jan
2023

What are Digital Certificates and How They Protect Website Data

Digital certificates are electronic credential that binds the identity to the owner of the certificate which can also pair the…

IcedID Malware Active Directory
14
Jan
2023

IcedID Malware Let Attackers Compromise the Active Directory

In a recent incident, within just 24 hours of initial access, the IcedID (aka BokBot) malware was used to successfully…

Kerberos Authentication
13
Jan
2023

What is Kerberos Authentication, How it Works?

Kerberos authentication is a cryptography-based protocol that is used to secure logins. The Kerberos is a mythological three-headed Greek creature….

Twitter Denies Hacking Claims
13
Jan
2023

Twitter Denies Hacking Claims and Theft of 200 Million Users

Twitter Inc. undertook a thorough investigation in response to recent media claims that the data of 200M Twitter users were…

Britain’s Postal Service
13
Jan
2023

Britain’s Postal Service, Royal Mail Suffers Cyber Attack

An incident involving a cyber attack has caused severe service disruptions at Royal Mail, the British postal service and courier…

Beware! Gootkit Loader Malware Using VLC Player to Deliver Malicious Payloads
12
Jan
2023

Gootkit Loader Malware Using VLC Player to Deliver Malicious Payloads

Trend Micro researchers recently reported that Australian healthcare entities were infected with a Cobalt Strike beacon after a new SEO…

Domains Used malware
12
Jan
2023

Over 1,300 Domains Used to Deliver Information Stealer Malware

The official AnyDesk website is being impersonated using more than 1,300 domains, all of which are linking to a Dropbox…

JsonWebToken Flaw
11
Jan
2023

9 Million Times Downloaded JsonWebToken Flaw

During the course of investigating the popular open-source project JsonWebToken, Unit 42 researchers discovered a new vulnerability. The cybersecurity analysts…

Spoofing
11
Jan
2023

What is Spoofing? How It Works?

Spoofing is a malicious practice that disguising as a legitimate source to gain sensitive information, or to gain access to…