Cybersecurity is not just a technical challenge but also a very human one. The more humans that organizations can get involved, the more diverse perspectives […]
Jaguar Land Rover Breached by HELLCAT Ransomware Group using Jira CredentialsÂ
Luxury automotive manufacturer Jaguar Land Rover (JLR) has become the latest victim of the rapidly emerging HELLCAT ransomware group, with sensitive internal documents and employee […]
AI Operator Agents Assisting Hackers To Write Malicious Code
AI-powered agents are evolving rapidly, offering enhanced capabilities to automate routine tasks, but researchers have discovered these same tools can be weaponized by malicious actors. […]
New C++ Based IIS Malware With Numerous Functionalities Mimics cmd.exe To Stay Undetected
Security researchers have uncovered a sophisticated malware strain targeting Microsoft’s Internet Information Services (IIS) web servers, leveraging C++ to deploy advanced evasion techniques and payload […]
New Steganographic Malware Attack via JPG File Delivers Multiple Password Stealing Malwares
A newly identified steganographic malware operation has emerged, using JPEG image files as a covert delivery mechanism for multiple password-stealing malware strains. Security researchers have […]
Manage Engine Analytics Vulnerability Allows User Account Takeover
A high-severity authentication vulnerability in ManageEngine Analytics Plus on-premise installations has been identified, potentially allowing malicious actors to gain unauthorized access to Active Directory (AD) […]
Zoom Team Chat Decrypted to Uncover User Activities
In a significant development for digital forensics investigators, new research has revealed comprehensive methods to decrypt Zoom Team Chat databases, potentially exposing sensitive user communications […]
Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions
Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypass spam filters and […]
How Economic Headwinds Influence the Ransomware Ecosystem
Inflation, cryptocurrency market volatility, and the ability to invest in defenses all influence the impact and severity of a ransomware attack, according to incident response […]
Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year
An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver Mirat botnet malware variants since at least […]