RansomHub Affiliate leverages Python-based backdoor

In an incident response in Q4 of 2024, GuidePoint Security identified evidence of a threat actor utilizing a Python-based backdoor to maintain access to compromised endpoints. The threat actor later leveraged this access to deploy RansomHub encryptors throughout the entire impacted network. ReliaQuest documented an earlier version of this malware on their website in February 2024….

Read More

McAfee’s 2025 Cybersecurity Predictions: AI-Powered Scams & Emerging Digital Threats Prime

 McAfee Corp., a global leader in online protection, today released its 2025 predictions. The predictions highlight emerging threats consumers may encounter as cybercriminals exploit advanced AI technology. From hyper-realistic deepfakes and live video scams to AI-driven phishing, smishing, and malware attacks, these predictions reveal how cybercrooks are using AI-powered tools to craft increasingly sophisticated and…

Read More

India ranks second globally in encrypted cyberattacks: Zscaler report

Zscaler, Inc. published its Zscaler ThreatLabz 2024 Encrypted Attacks Report, which explores the latest threats blocked by the Zscaler security cloud and provides critical insights into how encryption has become a conduit for more sophisticated threats, further compounded by the rise of artificial intelligence (AI). The findings suggest that India registered 5.2 billion, the second-highest…

Read More

Deployed WezRat Malware known to Execute Attackers Commands

Cyber researchers discovered on a new remote access trojan and information stealer used by Iranian state-sponsored actors to conduct reconnaissance of compromised endpoints and execute malicious commands. The malware was first documented late last month by U.S. and Israeli cybersecurity agencies, describing it as an “exploitation tool for gathering information about an end point and running remote…

Read More

“Nastiest Malware List of 2024, Unveiled by OpenText Cybersecurity

OpenText has revealed its highly anticipated “Nastiest Malware of 2024” list, spotlighting the year’s most notorious cyber threats. In its seventh year, OpenText’s cybersecurity experts have identified the most relentless and adaptive malware trends impacting industries worldwide. This year, ransomware aimed at critical infrastructure takes center stage, highlighting an urgent call for reinforced security to…

Read More

Indian education sector, an area for Soft Target by Cyber Criminals; Check Point Study

Indian education sector faces unprecedented surge in cyberattacks – Over 8,000 weekly attacks, double the global average: Check Point This stark contrast underscores the heightened vulnerability of Indian organisations in the face of escalating cyber threats. Check Point Software Technologies Ltd. has unveiled finding of its latest Threat Intelligence Report for the last 6 months…

Read More

Water Sigbin Hackers Exploit Oracle WebLogic Vulnerabilities

Cybersecurity researchers uncovered a sophisticated attack campaign by the Water Sigbin (aka 8220 Gang) threat actor that exploited vulnerabilities in the Oracle WebLogic Server, notably CVE-2017-3506 and CVE-2023-21839, to deploy the XMRig cryptocurrency miner on compromised systems.   The attack begins with the threat actor exploiting the WebLogic vulnerabilities to execute a malicious PowerShell script on the victim…

Read More

Hackers Backdoored Courtroom Video Recording Software With System Hijacking Malware

Hackers Backdoored Courtroom Video Recording Software With System Hijacking Malware Courtroom software hijacked discovered by researchers of Rapid7 A vulnerability (CVE-2024-4978) has been identified in JAVS Viewer v8.3.7, a critical component for managing digital recordings in legal and government environments.  The installer for this version is backdoored, allowing attackers to remotely seize control of infected…

Read More

Have you Noticed Job’s Adds Roaming Around Facebook; Beaware of Ov3r_Stealer’ Malware

Recently as I was going through my Facebook , I noticed that lot of job advertisement for various position mainly account manager. As I applied they send back queries asking for mobile number and What’s Up messages. Researchers first discovered the stealer in early December. It was being spread via a Facebook job advertisement for…

Read More