Kimusk’s HappyDoor Executed Via regsvr32 File To Evade Detection
05
Jul
2024

Kimusk’s HappyDoor Executed Via regsvr32 File To Evade Detection

Kimsuky, also known as the Velvet Chollima, Black Banshee, THALLIUM, or Emerald Sleet, is a North Korean state-sponsored advanced cyber…

Teamviewer Discloses Investigation Update Following Cyber Attack
05
Jul
2024

Teamviewer Discloses Investigation Update Following Cyber Attack

TeamViewer, the global leader in remote connectivity solutions, has provided an update on the cyber attack detected on June 26,…

The World’s Most Popular 3D-Printed Gun Was Designed by an Aspiring Terrorist
05
Jul
2024

The World’s Most Popular 3D-Printed Gun Was Designed by an Aspiring Terrorist

4chan is ephemeral (posts are routinely culled) and supposedly anonymous (the default name setting for anyone posting is simply “Anonymous”)….

Kimsuky HappyDoor regsvr32
05
Jul
2024

Cloudflare Details 1.1.1.1 Service Outage Incident

On June 27, 2024, Cloudflare experienced a disruption of its 1.1.1.1 DNS resolver service. This several-hour incident was caused by…

AI and Cybersecurity: Mitigating Risks and Safeguarding Digital Assets Leveraging Artificial Intelligence to Enhance Cybersecurity Defenses
05
Jul
2024

AI and Cybersecurity: Mitigating Risks and Safeguarding Digital Assets

Leveraging Artificial Intelligence to Enhance Cybersecurity Defenses Artificial Intelligence has become essential for safeguarding digital resources in cybersecurity. As organizations…

CTEM Operation
05
Jul
2024

Blueprint for Success: Implementing a CTEM Operation

Jul 05, 2024The Hacker NewsCloud Security / Attack Surface The attack surface isn’t what it once was and it’s becoming…

Censys detected 384,773 hosts still embedding a polyfill JS script linking to the malicious domain
05
Jul
2024

Censys detected 384,773 hosts still embedding a polyfill JS script linking to the malicious domain

Polyfill.io Supply Chain Attack: 384,773 hosts still embedding a polyfill JS script linking to the malicious domain Pierluigi Paganini July 05,…

Hackers Using ProxyLogon And ProxyShell To Attack Microsoft Exchange Servers
05
Jul
2024

Hackers Using ProxyLogon And ProxyShell To Attack Microsoft Exchange Servers

Hackers attack Microsoft Exchange servers because they often contain sensitive communication data that can be exploited for several illicit purposes….

Kimsuky HappyDoor regsvr32
05
Jul
2024

Mekotio Banking Trojan Attacking American Users To Steal Financial Data

Active since 2015, Mekotio is a Latin American banking trojan specifically designed to target financial data in regions like Brazil,…

New Golang Zergeca Botnet appeared in the threat landscape
05
Jul
2024

New Golang Zergeca Botnet appeared in the threat landscape

New Golang-based Zergeca Botnet appeared in the threat landscape Pierluigi Paganini July 05, 2024 Researchers uncovered a new Golang-based botnet…

FakeBat Malware Weaponizes Popular Apps
05
Jul
2024

Hackers Compromised Ethereum’s Mailing List to Drain Their Crypto Funds

In a recent cyberattack, hackers successfully compromised Ethereum’s mailing list, attempting to drain users’ crypto funds through a sophisticated phishing…

GootLoader Malware
05
Jul
2024

GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks

Jul 05, 2024NewsroomSEO Poisoning / Cyber Attack, The malware known as GootLoader continues to be in active use by threat…