The Sandman APT’s Secret Link to the Keyplug Backdoor in China

Researchers have uncovered intriguing parallels between the elusive advanced persistent threat (APT) known as Sandman and a threat cluster based in China, notorious for deploying the KEYPLUG…


0 Comments6 Minutes

iPhone Users Beware: Sneaky Attack Utilizing a Fake Lockdown Mode

Security experts have recently uncovered a sophisticated “post-exploitation tampering technique” that malicious actors can exploit. This technique allows them to execute covert attacks by…


0 Comments4 Minutes

BLUFFS Bluetooth Attack is Putting Devices at Risk

Recent investigations have brought to light a series of sophisticated attacks posing a significant threat to the forward secrecy and future secrecy guarantees of Bluetooth Classic. These exploits…


0 Comments6 Minutes

North Korea’s Lazarus Group has made $3 billion out of cryptocurrency hacks.

Since at least 2017, threat actors from the Democratic People’s Republic of Korea (DPRK) have been focusing on the cryptocurrency sector as a way to generate revenue and evade sanctions. In a…


0 Comments5 Minutes

The Methods Cybercriminals Use to Get Your Users’ Passwords and Then Sell Them

The value of account credentials has increased in the cybercrime market since they are a common initial access vector. Consequently, your company’s entire network could be at risk from just one…


0 Comments9 Minutes

Uncovering a Passive Approach to Extracting Private RSA Keys from SSH Tunnels

A recent study has shed light on the potential for passive network attackers to obtain Private RSA Keys from SSH Tunnels. This is achieved by capitalizing on the identification of inherent…


0 Comments5 Minutes

Emails with a shipping theme are being used to spread a new WailingCrab malware loader.

Cybercriminals are employing email messages centred around delivery and shipping to spread a newly identified and sophisticated malware loader named WailingCrab. “The malware itself is split…


0 Comments7 Minutes

North Korean hackers pose as recruiters and job seekers.

Threat actors from North Korea have been linked to two campaigns. In these instances, they distribute malware and engage in unauthorized job applications with companies in the United States and other…


0 Comments6 Minutes

NetSupport RAT targets both the business and government sectors

A remote access trojan, known as NetSupport RAT, is actively being used by threat actors to launch attacks on organizations across the education, government, and business services sectors.…


0 Comments4 Minutes

Play Ransomware Is being Provided as a Service to Cybercriminals

The Play ransomware strain has transformed into a lucrative business model, being marketed to other threat actors “as a service,” according to new data that was discovered by Adlumin.…


0 Comments4 Minutes