Cyber News

Chinese Houken Hackers Leveraging Ivanti CSA Vulnerabilities to Deploy Sophisticated Linux Rootkits

A recent cyberattack campaign has impacted critical sectors in France, with a China-linked threat group dubbed “Houken” exploiting zero-day vulnerabilities…

10 months ago

FileFix – Leveraging Windows Browser Vulnerabilities to Circumvent Mark-of-the-Web Defense

A new blog post by a security researcher has introduced a troubling variant of the notorious FileFix attack, posing fresh…

10 months ago

TA829 Hackers Unveil Advanced Tactics and Revamped RomCom Backdoor to Bypass Security Measures

The notorious threat actor TA829 has returned to the global cyber stage with a series of sophisticated campaigns that blend…

10 months ago

Cybersecurity Alert – Kimusky Hackers Deploy ClickFix Tactic to Launch Malicious Scripts on Targeted Systems

In early 2025, cybersecurity experts sounded the alarm as the North Korean-linked Kimsuky group escalated its use of a deceptive…

10 months ago

Cyber Offensive – Hacktivist Collective Targets Over 20 Critical Industries in Wake of Iran–Israel Tensions

In the aftermath of Israel’s June 2025 airstrikes on Iranian military and nuclear sites, the Middle East has witnessed not…

10 months ago

How Snake Keyloggers Use Java Utilities to Outsmart Security Measures

The ongoing turbulence in the Middle East is rippling through cyberspace, as threat actors intensify their efforts to exploit the…

10 months ago

Clickfix Technique Powers New Odyssey Malware to Harvest Browser Cookies, Passwords, and Wallet Data

The CYFIRMA research team has uncovered a new wave of cyberattacks targeting macOS users, leveraging the recently rebranded Odyssey Stealer…

10 months ago

WordPress Under Siege – Windows Trojan Infiltrates Through Stealthy PHP Backdoor Malware

A sophisticated new malware campaign targeting WordPress sites has security experts on high alert after a recent incident exposed a…

10 months ago

How a Network of 300+ Malicious Websites Was Used by Pakistani Actors to Distribute Info-Stealing Malware

A sophisticated network of over 300 malicious websites designed to deliver info-stealing malware has been traced to a group of…

10 months ago

Unseen Wings – How Blind Eagle Hackers Deploy Open-Source RATs and Ciphers to Evade Static Detection

In a recent detailed investigation by Trustwave SpiderLabs, the threat group Blind Eagle (APT-C-36) has been linked with the Russian bulletproof hosting…

10 months ago