Microsoft has disclosed that Russian government hackers, identified as the group Midnight Blizzard, have successfully infiltrated its corporate email systems and stolen source codes. The tech giant recently discovered unauthorized access attempts that were made using information obtained from a previous …
Rust’s strong focus on memory safety, which prevents common vulnerabilities such as buffer overflows, makes it a choice for threat actors to use Rust-based backdoors. Moreover, the performance of this language is appealing to many, and due to this, they …
Reserve Bank of India (RBI) has warned against the dangers of “juice jacking,” a cyberattack targeting mobile users who charge their devices at public USB ports. This advisory underscores the growing threat cybercriminals pose in public spaces such as airports, …
A new botnet named “COVID BOTNET” is being advertised on the dark web, claiming to target NATO servers and the broader Western digital infrastructure. The creators of this botnet are boasting about its ability to bypass anti-DDoS (Distributed Denial of …
A new post on a hacker forum has advertised the sale of a WordPress 0-day exploit. The seller claims that the exploit, packaged as a PHP script, can be used with a WordPress plugin to upload a shell to approximately 110,000 affected …
Hackers are exploiting the versatility of SVG (Scalable Vector Graphics) files to distribute the GUloader malware. Understanding hostile actors’ techniques and tools is essential to staying ahead in the ever-changing cybersecurity field. Its stealthy methods and ability to elude detection …
Attackers exploit an unpatched Popup Builder vulnerability (CVE-2023-6000) to inject malicious code into vulnerable websites’ “Custom JS or CSS” sections. The code redirects users to phishing sites or injects further malware, and the campaign has already infected over 3300 websites. …
COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding a new value on a specific registry key related to the COM object. This allows the threat actors to achieve …
Threat actors use weaponized PDF files to exploit software vulnerabilities, enabling them to execute malicious code on a target system.
The upsurge of Apple products has made Mac users the prime targets for hackers who use malware to exploit them.