activities

New Report Sheds Light on Earth Centaur Activities

Researchers uncovered details about the Earth Centaur group that has been targeting transportation firms and government agencies associated with transportation.… Read More

2 years ago

Hackers Targeting Myanmar Use Domain Fronting to Hide Malicious Activities

A malicious campaign has been found using domain fronting to hide C2 traffic by leveraging a legitimate domain owned by… Read More

2 years ago

VECTR – A Tool That Facilitates Tracking Of Your Red And Blue Team Testing Activities To Measure Detection And Prevention Capabilities Across Different Attack Scenarios

VECTR documentation can be found here: https://docs.vectr.ioVECTR Community Discord Channel: https://discord.gg/2FRd8zf728VECTR is a tool that facilitates tracking of your red… Read More

3 years ago

Cybersecurity Experts Warn of a Rise in Lyceum Hacker Group Activities in Tunisia

A threat actor, previously known for striking organizations in the energy and telecommunications sectors across the Middle East as early… Read More

3 years ago

EU officially blames Russia for 'Ghostwriter' hacking activities

The European Union has officially linked Russia to a hacking operation known as Ghostwriter that targets high-profile European Union officials,… Read More

3 years ago

TeaBot Trojan: Active and Performing Fraudulent Activities

Cybersecurity researchers reported a new Android banking trojan that hijacks user credentials and text messages to distribute fraudulent activities targeting… Read More

3 years ago

Over 25% Of Tor Exit Relays Spied On Users' Dark Web Activities

An unknown threat actor managed to control more than 27% of the entire Tor network exit capacity in early February… Read More

3 years ago

Exchange Server attacks: Microsoft shares intelligence on post-compromise activities

Many on-premises Microsoft Exchange servers are being patched, but Microsoft warns that its investigations have found multiple threats lurking on… Read More

3 years ago

Automatically mitigate ProxyLogon, detect IoCs associated with SolarWinds attackers’ activities

Microsoft has updated its Defender Antivirus to mitigate the ProxyLogon flaw on vulnerable Exchange Servers automatically, while the Cybersecurity and… Read More

3 years ago

Chameleon – Customizable Honeypots For Monitoring Network Traffic, Bots Activities And UsernamePassword Credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres And MySQL)

Customizable honeypots for monitoring network traffic, bots activities and usernamepassword credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP,… Read More

3 years ago

Key Trends: eCrime and Nation-State Activities

CrowdStrike revealed that there has been a humongous increase in interactive intrusion activity. There has been a fourfold increase in… Read More

3 years ago

Phishers Piggyback on Phishing Kits to Expand Their Activities

Compiled with a set of JavaScript functions, the novel toolkit dubbed LogoKit enables cybercriminals to change logos and text on… Read More

3 years ago

Eliciting Current Activities of Malicious Browser Extensions | Cyware Hacker News

With a significant person base, it will make it fairly easy for cybercriminals to publish destructive browser extensions that execute… Read More

3 years ago

Nation-State Hackers Caught Hiding Espionage Activities Behind Crypto Miners

A nation-state actor recognised for its espionage strategies due to the fact 2012 is now utilizing coin miner strategies to… Read More

3 years ago

Automation to shape cybersecurity activities in 2021 – Help Net Security

And as society continues to grapple with the impact of COVID-19, it is possible that these automated spear-phishing attacks will… Read More

3 years ago

The Federal security service of Russia stopped the activities of the largest group of hackers

More than 30 associates of an interregional legal team engaged in cloning and promoting credit history and payment cards of… Read More

4 years ago