LATEST

Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine

Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine

CYBER ATTACKZerowl

Gamaredon and Turla, two Russian hacking groups, are working together to target and co-compete with Ukrainian entities. Both organizations are thought to be connected to the Russian Federal S

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

CYBER ATTACKZerowl

An ongoing campaign that distributes a Windows spyware that has never been documented has targeted Russian organizations. According to cybersecurity vendor Kaspersky, the activity began in Ju

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers

CYBER ATTACKZerowl

Earlier this year, a major U.S. organization was the target of a suspected Chinese threat actor. The malicious activity was first discovered on April 11, 2024, and it persisted until August.

RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

CYBER ATTACKZerowl

RedDelta has targeted Vietnam, Cambodia, Taiwan, Mongolia, and Myanmar. A customized version of the PlugX backdoor is allegedly delivered by the China-nexus threat actor. The Communist Party

Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

CYBER ATTACKZerowl

Online, thousands of personal records purportedly connected to athletes and Saudi Games attendees have been made public. According to cybersecurity firm Resecurity, database dumps from the br

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

CYBER ATTACKZerowl

Chinese-speaking areas like Hong Kong, Taiwan, and Mainland China have been the target of numerous cyberattacks. The ValleyRAT payload is delivered by the attacks using a multi-stage loader k

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

CYBER ATTACKZerowl

A credential phishing scheme only targets high-value targets by using real-time email validation. Additionally, details of an email phishing campaign that uses file deletion reminders as a lu

North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks

North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks

CYBER ATTACKZerowl

A number of phishing attacks have been connected to Kimsuky, a threat actor associated with North Korea. Sending emails from Russian sender addresses is a component of the attacks. The ultima

North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack

North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack

CYBER ATTACKZerowl

According to Palo Alto Networks, North Korean threat actors connected to Jumpy Pisces, APT45, and Andariel used Play. It is the first known instance of an underground ransomware network and a

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

CYBER ATTACKZerowl

Kaspersky: Ymir, a ransomware family, was used in an attack two days after RustyStealer, a stealer malware. It is thought that the ransomware was installed by gaining unauthorized access to t

Top 5 this week

Page 193 of 202