Ransomware targets ESXi systems to tunnel traffic to C2 infrastructure using SSH
Cybersecurity analysts have recently highlighted a concerning trend in ransomware attacks targeting ESXi systems. These attacks are not only compromising…
DeepSeek: the rise of China’s AI challenger and its implications for the cyber landscape
In recent weeks, a new player in the artificial intelligence (AI) space has taken the tech world by storm: DeepSeek,…
Malware, ClickFix attack variant using Silk Road founder as lure
In a striking development in the cyber threat landscape, a new ClickFix attack variant has emerged, utilizing the recent pardon…
Large Scale Botnet AIRASHI
In August 2024, a significant cyber assault orchestrated by the AISURU botnet targeted the distribution platforms of the highly anticipated…
Conor Fitzpatrick, Pompompurin on Breachforums, to be resentenced
Conor Fitzpatrick, known in the cyber underworld as “Pompompurin,” is back in the spotlight as he prepares for resentencing after…
Linked a newly discovered Android malware named “Tanzeem” to the APT group DoNot Team
The recent research by CYFIRMA unveils a sophisticated Android malware operation linked to the Indian APT group known as DONOT,…
Critical vulnerability in the 7-Zip file archiver allows attackers to bypass MotW
A significant security vulnerability has been identified in the popular file archiver 7-Zip, allowing attackers to bypass the Windows Mark…
Murdoc_Botnet: researchers have identified a campaign exploiting vulnerabilities in AVTECH IP cameras, in a variant of Mirai
Cybersecurity researchers have raised alarms over the emergence of the Murdoc_Botnet, a new variant of the infamous Mirai botnet that…