Broadcom Targeted by Clop Ransomware Exploiting Oracle E-Business Suite Zero-Day Vulnerability In a significant cybersecurity incident, the Clop ransomware group has claimed responsibility for breaching […]
Archives
China’s APT24 Targets Taiwan with BadAudio Malware via Compromised Websites and Spear-Phishing Tactics
China’s APT24 Hackers Exploit Public Websites to Deploy BadAudio Malware Over the past three years, APT24, a cyber espionage group linked to China’s People’s Republic, […]
Retailers Face Surge in Ransomware Attacks as Holiday Season Approaches
Retailers Under Siege: Ransomware Attacks Surge During Holiday Season As the holiday shopping season approaches, retailers are increasingly becoming prime targets for ransomware attacks. Cybercriminals […]
Chinese Hackers Exploit WSUS RCE Vulnerability to Deploy ShadowPad Malware Globally
Chinese Hackers Exploit WSUS Vulnerability to Deploy ShadowPad Malware In a concerning development, Chinese state-sponsored cyber actors are actively exploiting a critical vulnerability in Microsoft’s […]
Sophisticated Cyberattack Operation DreamJob Targets Manufacturing via WhatsApp Exploit
Operation DreamJob: Sophisticated Cyberattack Targets Manufacturing Sector via WhatsApp In August 2025, a sophisticated cyberattack, dubbed Operation DreamJob, targeted an Asian subsidiary of a prominent […]
Matrix Push C2 Exploits Browsers for Fileless Cyber Attacks and Phishing
Matrix Push C2: The New Frontier in Browser-Based Cyber Attacks In the ever-evolving landscape of cyber threats, a new command-and-control (C2) platform named Matrix Push […]
Dark Web Job Market Prioritizes Practical Skills Over Credentials, Reflects Broader Tech Industry Trends
The Dark Web’s Evolving Job Market: Practical Skills Triumph Over Formal Education The clandestine realm of the dark web has undergone a significant transformation, emerging […]
Xillen Stealer Malware Advances with AI Evasion, Targets Credentials Across Global Cybercriminal Ecosystem
Xillen Stealer’s Evolution: Advanced Tactics in Credential Theft and AI Evasion Xillen Stealer, a Python-based information-stealing malware, has rapidly evolved into a formidable threat within […]
AI-Enhanced Obfuscation in Malicious Android Apps Evades Detection, Highlights Security Challenges
AI-Powered Obfuscation Enables Malicious Android Apps to Evade Antivirus Detection A new wave of malicious Android applications has emerged, impersonating a well-known Korean delivery service […]
Advanced Phishing Tactics Bypass Security Measures: Strengthening Cyber Defenses with Interactive Sandboxing
Phishing Attacks Evolve: How to Strengthen Your Defenses In today’s digital landscape, phishing attacks have become increasingly sophisticated, often bypassing traditional security measures and posing […]