A new email campaign attacking French entities uses a highly evasive attack chain. The phishing campaign is installing a new backdoor named Serpent. Initial…
python
Rewind of the 2021 Cybersecurity attacks
The Global Cybersecurity Outlook 2022 report has revealed that ransomware attacks have increased as such by 151% in 2021. There were nearly 270 cybersecurity…
‘Double Feature’: researchers dived in tool
Cybersecurity researchers have offered insight into a system known as Double Feature. The system tracks different stages of post-exploitation originating from the DanderSpiriz—a full-featured…
Windows vulnerabilities patched by Microsoft security patches
Microsoft rolled out security patches for vulnerabilities in windows. The patch addressed one of the critical vulnerabilities: the vulnerability was widely targeted by attackers…
Dropbox: PoC release for Ghostscript vulnerability that revealed Airbnb
Malicious programmers have delivered a proof-of-concept (PoC) code that takes advantage of and as of late displayed vulnerability in more seasoned yet generally utilized…
GitHub Copilot Code can lead to high level of vulnerabilities
A gathering of analysts has found that generally, 40% of the code created by the GitHub Copilot language model is entirely vulnerable. The artificial…
Linux System exploited by top vulnerability
Due to the fact that Linux-based systems are immediately accessible to the internet, attackers can simply target them to install malicious web shells and…
Government Urges Workers to Avoid Public Networks
Hackers might make use of public Wi-Fi at coffee shops, airports, and hotel rooms according to the National Security Agency, which issued a warning…
Chinese APT group GhostEmperor targeting Southeast Asia
There has been the discovery of a new Chinese-speaking threat actor who targets Microsoft Exchange vulnerabilities. GhostEmperor was an organization that targeted high-profile targets.…
APT SideCopy targeting Indian Government officials
Once corrupted, APT gang SideCopy utilizes some tools such as keyloggers, document enumerators, and others to rob data from the targets. They targeted web…