7-Zip Zero-Day Exploit Allegedly Leaked Online
A critical 7-Zip zero-day exploit has been allegedly leaked by a hacker who is an individual operating under the alias "NSA_Employee39" on X, which allows attackers to execute arbitrary code on a victim’s machine...
North Korean Hackers Employing New Tactic To Acquire Remote Jobs
Hackers increasingly target remote workers by exploiting vulnerabilities arising from the shift to telecommuting.
They use tactics like "voice phishing" (vishing) to gain access to corporate networks. They impersonate IT staff and trick employees into...
Chinese Hackers Toolkit Uncovered And Activity History Uncovered
Threat actors encompass a range of individuals and groups that pose several cybersecurity risks. Their activities and tactics have evolved immensely over time and are primarily aimed at "espionage," "disruption," and "financial gain."
The...
GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors
A honeypot is a 'cybersecurity mechanism' that is primarily designed to lure threat actors away from legitimate targets.
While this mechanism is performed by simulating a valuable asset like a "server" or "application."
Not...
North Korean Hackers Attacking U.S. Organizations With Unique Hacking Tools
Cyber extortion is a cybercrime under which the threat actors illicitly access "sensitive data" in systems and demand a "ransom" to stop the attack to restore access.
There are two primary types of cyber...
Hackers Turned Visual Studio Code As A Remote Access Tool
Visual Studio is a powerful integrated development environment from Microsoft and it's primarily used for developing apps on the ".NET framework."
It supports various programming languages which include "C#," "VB.NET," and "C++."
The Cyble Research and...
UNC1860 Hackers Use Specialized Tools & Backdoors To Penetrate Victims’ Networks
Mandiant exposed the activities of UNC1860, a sophisticated Iranian state-sponsored cyber group. This group, believed to be affiliated with Iran’s Ministry of Intelligence and Security (MOIS), has been actively infiltrating high-priority networks across the...
Open Source C2 Frameworks Used In Red Teaming Vulnerable To RCE Attacks
A C2 framework is an architecture that controls and maintains access to compromised systems. Its purpose is to allow you to run commands on other people's computers, but many C2 frameworks are vulnerable to...
Greasy Opal, Hackers Created 750 Million Fake Microsoft Accounts
Greasy Opal, based in the Czech Republic since 2009, is reportedly a Cyber Attack Enablement company that manufactures and markets advanced cyber attack bypassing tools and devices.
The company's main product features robust and rapid...
Xeon Sender Abusing Nine SaaS providers For Massive SMS Attacks
Xeon Sender, a Python script, is a tool that enables threat actors to send spam messages through nine different SaaS providers.
Initially observed in 2022, various threat actors have reused and rebranded this tool...