Cyber Security Blog

Two Sudanese Brothers Charged by U.S. for Largest Ever 35,000 DDoS Attacks

Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that conducted a record 35,000...

Malicious Hackers Utilize EDRSilencer Tool to Evade Security Measures and Conceal their Activities

Threat actors are using the open-source EDRSilencer tool to compromise endpoint detection and response (EDR) solutions and conceal malicious activities. Trend Micro has identified instances...

Astaroth Banking Malware Returns in Brazil Through Spear-Phishing Attack

A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to...

Android Banking Trojan, TrickMo, Now Capable of Stealing PINs and Unlock Patterns

New variants of the Android banking trojan TrickMo have been discovered with previously undocumented features that allow them to steal a device's unlock pattern...

China Claims U.S. is Falsely Creating Volt Typhoon to Conceal Its Own Hacking Activities

China's National Computer Virus Emergency Response Center (CVERC) is adamant that the Volt Typhoon...

Nation-State Hackers are Using Ivanti CSA Vulnerabilities to Infiltrate Networks

A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of...

Exploited Veeam Vulnerability Enables Spread of Akira and Fog Ransomware

Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and Fog ransomware. Cybersecurity vendor Sophos...

Must Read