7-Zip Zero-Day Exploit

7-Zip Zero-Day Exploit Allegedly Leaked Online

A critical 7-Zip zero-day exploit has been allegedly leaked by a hacker who is an individual operating under the alias "NSA_Employee39" on X, which allows attackers to execute arbitrary code on a victim’s machine...
North Korean Hackers Employing New Tactic To Acquire Remote Jobs

North Korean Hackers Employing New Tactic To Acquire Remote Jobs

Hackers increasingly target remote workers by exploiting vulnerabilities arising from the shift to telecommuting. They use tactics like "voice phishing" (vishing) to gain access to corporate networks. They impersonate IT staff and trick employees into...
Chinese Hackers Toolkit Uncovered And Activity History Uncovered

Chinese Hackers Toolkit Uncovered And Activity History Uncovered

Threat actors encompass a range of individuals and groups that pose several cybersecurity risks. Their activities and tactics have evolved immensely over time and are primarily aimed at "espionage," "disruption," and "financial gain." The...
GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors

GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors

⁤A honeypot is a 'cybersecurity mechanism' that is primarily designed to lure threat actors away from legitimate targets. ⁤ ⁤While this mechanism is performed by simulating a valuable asset like a "server" or "application." ⁤ ⁤Not...
North Korean Hackers Attacking U.S. Organizations With Unique Hacking Tools

North Korean Hackers Attacking U.S. Organizations With Unique Hacking Tools

⁤Cyber extortion is a cybercrime under which the threat actors illicitly access "sensitive data" in systems and demand a "ransom" to stop the attack to restore access. ⁤ There are two primary types of cyber...
Hackers Turned Visual Studio Code As A Remote Access Tool

Hackers Turned Visual Studio Code As A Remote Access Tool

Visual Studio is a powerful integrated development environment from Microsoft and it's primarily used for developing apps on the ".NET framework."  It supports various programming languages which include "C#," "VB.NET," and "C++." The Cyble Research and...
UNC1860 Hackers Use Specialized Tools And Backdoors To Penetrate Victims’ Networks

UNC1860 Hackers Use Specialized Tools & Backdoors To Penetrate Victims’ Networks

Mandiant exposed the activities of UNC1860, a sophisticated Iranian state-sponsored cyber group. This group, believed to be affiliated with Iran’s Ministry of Intelligence and Security (MOIS), has been actively infiltrating high-priority networks across the...
Red Teaming C2 Frameworks

Open Source C2 Frameworks Used In Red Teaming Vulnerable To RCE Attacks

A C2 framework is an architecture that controls and maintains access to compromised systems. Its purpose is to allow you to run commands on other people's computers, but many C2 frameworks are vulnerable to...
Greasy Opal, Hackers Created 750 Million Fake Microsoft Accounts

Greasy Opal, Hackers Created 750 Million Fake Microsoft Accounts

Greasy Opal, based in the Czech Republic since 2009, is reportedly a Cyber Attack Enablement company that manufactures and markets advanced cyber attack bypassing tools and devices. The company's main product features robust and rapid...
Xeon Sender Abusing Nine SaaS providers For Massive SMS Attacks

Xeon Sender Abusing Nine SaaS providers For Massive SMS Attacks

Xeon Sender, a Python script, is a tool that enables threat actors to send spam messages through nine different SaaS providers. Initially observed in 2022, various threat actors have reused and rebranded this tool...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...