Cyber News

XWorm: Evolving Threat – New Stagers and Loaders Outwit Security Systems

In the ever-shifting landscape of cybercrime, XWorm, a notorious remote access trojan (RAT), continues to evolve, arming threat actors with…

10 months ago

Malware Payloads Deployed in the Wild Using Abused AV/EDR Evasion Framework

Elastic Security Labs has sounded the alarm after uncovering multiple active infostealer campaigns leveraging the commercial AV/EDR evasion framework SHELTER…

10 months ago

Scattered Spider Enhances Strategy – Leveraging Legitimate Tools for Evasion and Long-term Stealth

A notorious cybercriminal group operating under the name Scattered Spider (also known as UNC3944, Scatter Swine, and Muddled Libra) has…

10 months ago

Cybercriminals Abuse Genuine Inno Setup Installer to Distribute Malware

In a concerning trend for Windows users and the broader cybersecurity landscape, cybercriminals are increasingly leveraging legitimate software installation frameworks…

10 months ago

New Breakthrough – Researchers Develop Innovative Method to Detect and Sustain Azure Arc in Enterprise Networks

A recent red team operation identified a significant security risk related to Microsoft Azure Arc, a service that bridges Azure…

10 months ago

Cryptomining Payloads Deployed via Java Debug Wire Protocol Server Exploits by Hackers

In a recent security incident, the Wiz Research Team uncovered a sophisticated cyberattack targeting TeamCity, a popular continuous integration and…

10 months ago

Exploiting Pastebin for Payloads – The Role of Hpingbot and Hping3 in DDoS Campaigns

In June 2025, cybersecurity researchers at NSFOCUS Fuying Lab detected a powerful new botnet named hpingbot proliferating across global networks. Distinct from…

10 months ago

Cybercriminals Deploy Fake Cloudflare Screen to Coerce Malware Execution

In a sophisticated new wave of social engineering attacks, cybercriminals are exploiting users’ trust in security measures by deploying a…

10 months ago

Exposed VPN Keys and Over-Permissioned Roles in Azure API Vulnerabilities

Azure, Microsoft’s flagship cloud platform, faces new scrutiny after security researchers from Token Security uncovered critical misconfigurations in multiple built-in…

10 months ago

Rampant Use of .COM Domain for Hosting Credential Phishing Sites by Cybercriminals

Cybercriminals have long abused common Top-Level Domains (TLDs) such as .com and .ru to launch widespread credential phishing campaigns. However,…

10 months ago