
Blog
-
Cascading Shadows: An Attack Chain Approach to Avoid Detection and Complicate Analysis
A multi-layered attack chain was uncovered in December 2024, employing distinct stages to deliver malware like Agent Tesla variants, Remcos…
-
Latest Mustang Panda Arsenal: Toneshell, StarProxy, PAKLOG, CorKLOG, and SplatCloak
Mustang Panda, a threat actor group, has developed new tools including two keyloggers (PAKLOG and CorKLOG) and an EDR evasion…
-
Renewed APT29 Phishing Campaign Against European Diplomats
A sophisticated phishing campaign targeting European diplomatic entities has been uncovered, attributed to the Russia-linked threat group APT29. The attackers…
-
CVE202530406 Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild
A critical vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox software has been discovered and is being actively exploited. The flaw…
-
Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain
Cybersecurity experts have identified a growing threat vector where attackers exploit improperly configured or abandoned DNS records to hijack organizational…
-
Hackers Mimic Google Chrome Install Page on Google Play to Deploy Android Malware
Security researchers have uncovered a sophisticated malware campaign targeting Android users through fake Google Chrome installation pages.Cybercriminals have created deceptive…
-
Cybersecurity Weekly Recap: Key Updates on Attacks, Vulnerabilities, & Data Breaches
Welcome to this week’s Cybersecurity Newsletter, providing you with the latest updates and essential insights from the rapidly evolving field…
-
Threat Actors Manipulate Search Results to Direct Users to Malicious Websites
The digital landscape has become increasingly perilous as cybercriminals develop sophisticated methods to manipulate search engine results, directing unsuspecting users…
-
RansomHub Ransomware Group Compromised 84 Organization, New Groups Emerging
In a significant development within the cybersecurity landscape, the RansomHub ransomware group has emerged as a major threat in March…
-
HelloKitty Ransomware Resurafced Targeting Windows, Linux, & ESXi Environments
Cybersecurity experts have detected a concerning revival of the HelloKitty ransomware, with new variants actively targeting Windows, Linux, and ESXi…