Hackers Leveraging Extended Attributes To Evade detection In macOS Systems

Hackers Leveraging Extended Attributes To Evade Detection In macOS Systems

Researchers discovered a novel approach employed by the threat actor to conceal codes using Extended Attributes to avoid detection in macOS devices. Extended attributes are metadata that can be linked to different file systems' files...
APT36 Hackers Attacking High-Profile Users Of Windows Devices With ElizaRAT

APT36 Group Attacking Windows Systems Absuing Google Drive & Slack

ElizaRAT is a type of malware that primarily targets Windows systems and functions as a RAT. It enables threat actors to gain unauthorized access to infected machines. This malware is often distributed through phishing campaigns...
Threat Actors Planted ‘Pygmy Goat’ Backdoor On Hacked Sophos XG Firewall Devices

Threat Actors Planted ‘Pygmy Goat’ Backdoor On Hacked Sophos XG Firewall

NCSC researchers have uncovered a sophisticated backdoor dubbed "Pygmy Goat" that was deployed on compromised Sophos XG firewall devices. The malware, discovered by the National Cyber Security Centre (NCSC), provides attackers with persistent access and...
Cynet Security Achieves 426% ROI in Forrester Total Economic Impact™ Study

Cynet Security Achieves 426% ROI in Forrester Total Economic Impact™ Study

Cost savings and business benefits were quantified in “The Total Economic Impact™ of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024. The Total Economic Impact™...
New Encoding Technique Jailbreaks ChatGPT-4o To Write Exploit Codes

New Encoding Technique Jailbreaks ChatGPT-4o To Write Exploit Codes

A novel encoding method enables ChatGPT-4o and various other well-known AI models to override their internal protections, facilitating the creation of exploit code. Marco Figueroa has uncovered this encoding technique, which allows ChatGPT-4o and other...
Mamba Toolkit Abuses Multi-Factor Authentication In Sophisticated Phishing Attack

Mamba Toolkit Abuses 2FA In Sophisticated Phishing Attack

Phishing attacks are stealthy cyber threats where threat actors impersonate reputable entities to trick individuals into revealing sensitive information ("passwords" or "financial details").  These types of attacks are executed via "emails" or "messages" that create...
GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors

GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors

⁤A honeypot is a 'cybersecurity mechanism' that is primarily designed to lure threat actors away from legitimate targets. ⁤ ⁤While this mechanism is performed by simulating a valuable asset like a "server" or "application." ⁤ ⁤Not...
GoldenJackal Using Custom Toolset To Attack Air-Gapped Systems

GoldenJackal Using Custom Toolset To Attack Air-Gapped Systems

Air-gapped systems are security measures that isolate "computers" and "networks" from external connections (like the "internet") to block 'unauthorized access' and 'cyber threats.' ⁤ ⁤This isolation can be done via "physical disconnection" or "logical configurations"...
RPKI Security Under Fire – 53 Vulnerabilities Exposed In New Research

50+ Vulnerabilities Uncovered in RPKI security Framework for Internet Routing

RPKI is a security framework designed to enhance the integrity of Internet routing by associating specific IP address blocks and ASNs with their legitimate holders.  It employs cryptographic certificates that are known as ROAs to...
New Sophisticated Rootkit Targeting Arch Linux

New Snapekit Rootkit Malware Targeting Arch Linux Users

A rootkit is a type of malicious software that is primarily designed to provide unauthorized access and control over a computer system while hiding its presence. They can be difficult to detect and remove as...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...