Experts Uncover Year-Long Cyber Attack on IT Firm Utilizing Custom Malware RDStealer
By:
Jun 20, 2023Ravie Lakshmanan
A highly targeted cyber attack against an East Asian IT company involved the deployment of a custom malware written in Golang called RDStealer.
"The operation was...
Clop Ransomware Gang Likely Aware of MOVEit Transfer Vulnerability Since 2021
By:
Jun 08, 2023Ravie LakshmananRansomware / Zero-Day
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published a joint advisory regarding the active exploitation...
Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals
By:
Jun 06, 2023Ravie LakshmananEndpoint Security / Data Security
Threat actors associated with the Cyclops ransomware have been observed offering an information stealer malware that's designed to capture sensitive data...
Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks
By:
May 31, 2023Ravie LakshmananAdvanced Persistent Threat
The threat actor known as Dark Pink has been linked to five new attacks aimed at various entities in Belgium, Brunei, Indonesia, Thailand,...
Don’t Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims
By:
A new phishing technique called "file archiver in the browser" can be leveraged to "emulate" a file archiver software in a web browser when a victim visits a...
Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks
By:
May 18, 2023Ravie LakshmananCyber War / Threat Intel
The rising geopolitical tensions between China and Taiwan in recent months have sparked a noticeable uptick in cyber attacks on the...
China’s Mustang Panda Hackers Exploit TP-Link Routers for Persistent Attacks
By:
May 16, 2023Ravie LakshmananNetwork Security / Threat Intel
The Chinese nation-state actor known as Mustang Panda has been linked to a new set of sophisticated and targeted attacks aimed...
Researchers Uncover Powerful Backdoor and Custom Implant in Year-Long Cyber Campaign
By:
May 15, 2023Ravie LakshmananCyber Threat / Malware
Government, aviation, education, and telecom sectors located in South and Southeast Asia have come under the radar of a new hacking group...
Why Honeytokens Are the Future of Intrusion Detection
By:
A few weeks ago, the 32nd edition of RSA, one of the world's largest cybersecurity conferences, wrapped up in San Francisco. Among the highlights, Kevin Mandia, CEO of...
U.S. Government Neutralizes Russia’s Most Sophisticated Snake Cyber Espionage Tool
By:
The U.S. government on Tuesday announced the court-authorized disruption of a global network compromised by an advanced malware strain known as Snake wielded by Russia's Federal Security Service...