A cybercrime group known as the “Lemon Group” has recently come into the spotlight. It is for pre-installing malware named ‘Guerilla’ on a staggering…
Chinese
Southeast and East Asia are the targets of phoney installers.
Researchers from ESET have discovered a malware operation that preys on Chinese speakers in Southeast and East Asia, paying for deceptive ads appearing in…
Vulnerabilities in Sunlogin- Hackers Backdoored Windows
A new hacking campaign has emerged that exploits the vulnerabilities in Sunlogin. It is to deploy the Sliver post-exploitation toolkit and launch Windows Bring…
Log4j vulnerability is still active a year later.
Amidst mitigation, Log4j one of the worst internet bugs in history is still being exploited. The Apache Software Foundation revealed a vulnerability, sending the…
Researchers Revealed 80 ShadowPad Malware C2 Servers.
Since September 2021, up to 85 command-and-control (C2) servers have been identified as being used by the ShadowPad malware. Along with infrastructure being founded…
Fortinet products have a serious authentication issue.
Customers are being urged by Fortinet to repair a serious authentication bypass flaw that has already been used in the wild. Fortinet products contain…
The IT infrastructure was impacted by the Tata Power cyberattack, and the bill payment interface was down for a week.
R.K. Singh, the Union Power Minister, stated last month that the Electricity Amendment Bill’s provisions for frequent inspections. And prompt action will soon make…
Israeli Targets Are Attacked By Hackers with Iranian Ties
Commercial Cloud Storage Accounts are Used by Polonium for Command-and-Control Israeli groups are being targeted by an Iranian-affiliated advanced persistent threat cell operating out…
An unauthorized WhatsApp Android app was discovered taking user accounts.
YoWhatsApp, an unauthorized WhatsApp Android app, has a new version that has been discovered to steal account access keys from users. YoWhatsApp is a…
Anyone may start Microsoft 365 phishing attacks using the caffeine service.
Threat actors can easily launch attacks thanks to the “Caffeine” phishing-as-a-service (PhaaS) platform (Microsoft 365 Phishing Attacks), which has an open registration process that…