“Arda” PowerLess Malware
A well-known hacking group called GreenCharlie (also known as APT42, TA453, or Mint Sandstorm) has set up new online infrastructure between January and February 2025, which is believed to beRead More →
Information security specialist, currently working as risk infrastructure specialist & investigator.
15 years of experience in risk and control process, security audit support, business continuity design and support, workgroup management and information security standards.
A well-known hacking group called GreenCharlie (also known as APT42, TA453, or Mint Sandstorm) has set up new online infrastructure between January and February 2025, which is believed to beRead More →
A cybercriminal named “mr. Guram,” affiliated with the notorious “Ramp” group, has launched Mimic v.10, a new Ransomware-as-a-Service (RaaS) program, allowing hackers and Initial Access Brokers (IABs) to distribute ransomwareRead More →
On February 21, 2025, cybersecurity expert Jason Haddix, from Arcanum Information Security, released MSFTRecon—a powerful tool designed to scan Microsoft 365 and Azure for security loopholes, misconfigurations, and attack pathsRead More →
A sophisticated cyberespionage group known as Earth Preta (also called Mustang Panda) has been identified using advanced techniques to infiltrate systems and evade detection. Their stealthy approach involves leveraging legitimateRead More →
A cybercriminal known as “7****7” is selling a database of 45,000 Chinese women living in the US on a dark web marketplace called Chang’An Sleepless Night for $350. The databaseRead More →
Washington, D.C. – In a landmark case highlighting the growing cybersecurity threats to financial institutions and digital platforms, Eric Council Jr., a 25-year-old Alabama resident, has pleaded guilty to conductingRead More →
A large-scale malware campaign, dubbed FatBoyPanel, is targeting Android users in India, compromising over 50,000 victims. Security researchers from Zimperium attribute this attack to a single threat actor deploying overRead More →
A new artificial intelligence (AI) tool called GhostGPT is being misused by cybercriminals to create harmful programs, hack systems, and send convincing phishing emails. Security researchers from Abnormal Security foundRead More →
In a critical security disclosure, the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Food and Drug Administration (FDA) have warned healthcare providers and cybersecurity professionals about a high-riskRead More →
There is a secretive online place called Exploit, which is like a dark web forum where hackers and cybercriminals gather to discuss and sell illegal things, like stolen data, hackedRead More →
In October 2024, a very powerful cyberattack was launched. This attack was a type of DDoS attack. DDoS means “Distributed Denial of Service,” where hackers use many devices to overwhelmRead More →
Recently, cybercriminals launched a phishing attack using fake YouTube links to steal user login credentials. These links were cleverly disguised to look legitimate and used redirections through multiple websites toRead More →
The Federal Trade Commission (FTC) has initiated enforcement actions against General Motors (GM) and its subsidiary OnStar for unauthorized and misleading practices involving the collection and sale of sensitive driverRead More →
Introduction: In recent cyber incidents, attackers have been targeting Microsoft 365 accounts using a sophisticated and fast-paced method. On January 6, 2025, cybercriminals began exploiting a tool called “FastHTTP” toRead More →
In a world where small businesses depend on the digital frontier for survival, a shadow loomed large over one of the industry’s titans. GoDaddy, the once-revered web hosting giant, isRead More →
In December 2024, Arctic Wolf Labs uncovered a targeted campaign exploiting Fortinet FortiGate firewalls via publicly exposed management interfaces. This campaign enabled threat actors to gain unauthorized access, alter configurations,Read More →
A new zero-click vulnerability, CVE-2024-49415, has been uncovered by a Google Project Zero researcher, highlighting a critical flaw in Samsung’s implementation of Rich Communication Services (RCS). This vulnerability, with aRead More →
In a move aimed at bolstering consumer cybersecurity, the Federal Communications Commission (FCC) has introduced the U.S. Cyber Trust Mark program. This voluntary initiative focuses on helping consumers identify InternetRead More →
MediaTek’s January 2025 Product Security Bulletin has highlighted a critical Remote Code Execution (RCE) vulnerability, identified as CVE-2024-20154, which affects millions of devices using MediaTek chipsets. This vulnerability is presentRead More →
The LDAPNightmare Proof-of-Concept (PoC) exploit, leveraging the critical vulnerability CVE-2024-49113, has brought to light serious weaknesses in Windows Server environments. This vulnerability targets the Local Security Authority Subsystem Service (LSASS),Read More →