A major hospital in Russia’s western region has been forced offline. The cyberattack has disrupted critical medical services for days. Patients have been diverted to other facilities. Medical staff are working with paper records. A pro-Ukrainian hacking group has claimed responsibility for the attack. Critical Systems Compromised The attack hit …
Indian Army Enhances Cyber Defenses
In response to an alarming rise in cyberattacks targeting defense-linked infrastructure, the Indian Army has significantly bolstered its cybersecurity protocols. This strategic move underscores India’s growing recognition of cyberspace as a critical domain of warfare, on par with land, air, sea, and space. Recent Threats Prompting Action The decision follows …
Backdoor Alert: Fake WordPress Plugin Grants Admin Access
In the vast and ever-evolving landscape of cybersecurity threats, WordPress has remained a constant target due to its widespread use and open-source nature. While the platform offers flexibility and a robust plugin ecosystem, it also presents significant opportunities for exploitation. Recently, a new threat emerged in the form of a …
Windows Defender Bypassed Using Microsoft’s WinDbg
A recent cyberattack revealed a new method used by hackers. They bypassed Windows Defender policies using WinDbg Preview. This app, developed by Microsoft, is available on the Microsoft Store. It’s mainly a debugging tool. But attackers repurposed it to launch stealthy attacks. This breach shows how even trusted software can …
Supply Chain Attack: PyPI Malware Steals Sensitive Info
What Happened? In a startling revelation, cybersecurity researchers have discovered a series of malicious Python packages uploaded to PyPI (Python Package Index), the official repository for Python libraries. These packages were downloaded more than 39,000 times, spreading stealth malware to unsuspecting developers around the globe. This campaign is part of …
FIN7 Exploits SharePoint to Deploy Anubis Backdoor
Cybercriminal groups are constantly evolving their tactics to breach enterprise networks, and FIN7 is no exception. The notorious hacking group, known for its financially motivated cyberattacks, has recently been observed deploying the Anubis backdoor to hijack Windows systems. This latest campaign involves exploiting compromised Microsoft SharePoint sites to distribute malicious …
Fileless Cryptojacking Campaign Exploits 1k+ PostgreSQL Servers
A recent large-scale cyberattack has compromised over 1,500 PostgreSQL servers in a sophisticated fileless cryptocurrency mining campaign. The attackers exploit weak security configurations to deploy cryptojacking malware, which hijacks computing resources to mine cryptocurrencies without the knowledge or consent of the server owners. This incident underscores the growing threat to …
Earth Alux: China-Linked APT Uses VARGEIT & COBEACON
Recent cybersecurity investigations have revealed a series of highly sophisticated cyber intrusions attributed to a threat actor group known as “Earth Alux.” This group, believed to be linked to China, has been engaging in prolonged and stealthy cyber-espionage operations, targeting organizations worldwide. Their use of advanced malware tools—VARGEIT and COBEACON—demonstrates …
Researchers Uncover BlackLock Ransomware Secrets
In a significant breakthrough, cybersecurity researchers have successfully exposed the operations of the notorious BlackLock ransomware gang after identifying and exploiting a vulnerability in their leak site. This revelation has not only provided insight into the group’s infrastructure but also raised questions about the security measures employed by cybercriminals to …
CoffeeLoader: GPU-Powered Malware Evading EDR & Antivirus
Cybercriminals are continuously developing advanced techniques to evade detection by Endpoint Detection and Response (EDR) solutions and traditional antivirus software. One such emerging threat is CoffeeLoader, a sophisticated malware loader leveraging GPU-based Armoury Packer to avoid detection. This new approach presents a significant challenge for cybersecurity professionals as it shifts …