Top Sophisticated Cyber Security Threats of 2024
As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the malware landscape.
ANY.RUN, a leading interactive malware analysis platform, has released its quarterly report, shedding...
Hackers Deploy AsyncRAT and SectopRAT Using ScreenConnect Software on Windows
Cybercriminal groups are increasingly blending new and traditional techniques to steal sensitive information from unsuspecting users by deploying remote access tools (RATs) such as AsyncRAT and SectopRAT.
Recent activity in the cyber threat landscape highlights...
Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...
In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been linked to a massive rogue Remote Desktop Protocol (RDP) campaign.
Earth...
Hackers Exploiting Google Search Ads to Launch Malvertising Campaigns
Threat researchers have identified a persistent series of malvertising campaigns targeting graphic design professionals, using Google Search ads as a vector.
This campaign, active since at least November 13, 2024, exploits two dedicated IP...
Hackers Weaponize Google Drive Links to Breach Corporate Networks
A sophisticated attack campaign targeting organizations in Japan and other East Asian countries. The threat actor, identified as APT-C-60, is employing a clever social engineering tactic that exploits job application processes to infiltrate corporate...
Radiant Hacked – $50 Million USD Worth Crypto Stolen by North Korean Hackers
Radiant Capital, a prominent decentralized finance (DeFi) protocol, has fallen victim to a major security breach, resulting in the loss of approximately $50 million USD.
The attack, which exploited vulnerabilities in the devices of...
Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users
A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms.
MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks
Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless phishing attack tactics, which evade major EDR detection.
The group, which...
“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks
Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks.
Highly advanced methods are used in these campaigns to trick people...
Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory
A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA).
On...