Blog Series
cyber threats
Alert: FBI Warns Of BlackCat...
In recent months, a concerning trend has emerged within the healthcare sector: the resurgence of BlackCat ransomware attacks. The BlackCat ransomware healthcare attack has prompted a joint advisory from the...
New SSH-Snake Worm-Like Tool Threatens...
The Sysdig Threat Research Team (TRT) discovered that a threat actor is leveraging an open-source network mapping tool called SSH-Snake for malicious activities. This tool utilizes SSH credentials found on...
SNS Sender Script Used for...
A new threat has emerged in the form of a Python script called SNS Sender, which malicious actors are utilizing to send bulk smishing messages through Amazon Web Services (AWS)...
LockBit Ransomware Bounty: US Offers...
In a landscape where cyber threats loom large, the hunt for cybercriminals intensifies. Today, we’re turning the spotlight on LockBit ransomware attacks and the unprecedented $15 million bounty offered by...
Deepfakes Malware Attacks: GoldFactory’s Advanced...
In the ever-evolving landscape of mobile Deepfakes malware attacks, a notorious threat actor named GoldFactory has surfaced, leaving a trail of highly sophisticated banking trojans in its wake. The group,...
Ivanti Pulse Secure Found Using...
Ivanti Pulse Secure VPN appliances have recently been a target of several sophisticated attacks, highlighting the ongoing challenges in safeguarding critical IT infrastructure like network devices. UNC5221, a nation-state group,...
Alert: Coyote Trojan Strike Compromises...
Financial cyberattacks pose a significant threat to the stability of global economies and the security of financial institutions. In a recent cybersecurity development, a staggering 61 banks in Brazil have...
MoqHao Evolution Poses Immense Threat...
Cybersecurity threat experts have recently discovered a new variant of the malware named XLoader, commonly known as MoqHao, that has the ability to automatically infect devices without any user interaction....
FortiGate Flaw: Threat Actors Breach...
In a recent revelation, the Dutch Ministry of Defence disclosed a concerning breach in its internal computer network, orchestrated by Chinese state-sponsored hackers. The network security breach, detected by both...
Critical PixieFail Vulnerabilities Lead to...
A set of critical security vulnerabilities has been found in the TCP/IP network protocol stack of an open-source reference implementation of the Unified Extensible Firmware Interface (UEFI) specification. Named PixieFail...
Commando Cat Attacks: Protect Exposed...
Exposed Docker API risks pose significant security threats to organizations utilizing container technology. In recent months, a sophisticated crypto jacking operation dubbed Commando Cat has emerged as a potent threat...