Category: Cyber Security

RedCurl group

Hackers Abuse Windows Feature: RedCurl’s Stealthy Attack

Trend Micro has unveiled novel cyberattack methodologies employed by the RedCurl group, which manipulates a legitimate Windows component to execute malevolent commands. The Program Compatibility Assistant (PCA), designed to address compatibility issues with older...

Cyber Espionage

Leicester Suffers Major Cyber Attack

Authorities in Leicester, a city in Leicestershire, Britain, have reported a serious cyber incident that necessitated the temporary shutdown of the city’s operational systems and critical telephone lines. The disruption to services was first...

Pegasus spyware Jordan

French Government Websites Crippled in DDoS Attack

Several French governmental organizations have experienced cyberattacks of unprecedented intensity, as reported by the country’s Prime Minister’s office on March 11th. These attacks commenced on the evening of March 10th, and while their exact...

TA4903

Fake Government Emails: TA4903 Targets Businesses

A report by the leading company Proofpoint has unveiled a sophisticated cyber fraud scheme orchestrated by the hacker group TA4903. This gang specializes in Business Email Compromise (BEC) attacks and has, over the past...

ICS Attack Framework “TRITON”

FINTRAC Shuts Down Systems After Cyberattack

The Canadian Financial Transactions and Reports Analysis Centre (FINTRAC) announced the shutdown of its corporate systems due to a cybersecurity incident. Details of the incident remain undisclosed; however, it is known that FINTRAC is...

Stormous Ransomware

GhostLocker & Stormous: Ransomware Duo Wreaks Havoc

The international cybercriminal syndicate GhostSec, implicated in the creation and dissemination of ransomware named GhostLocker, is rapidly expanding the scope of its malevolent operations, encroaching upon an increasing number of countries. According to a...

CVE-2024-21410

Warning: Lotus Bane Cyberattack Breaches Vietnam

A financial institution in Vietnam became the target of a previously unknown hacking collective, dubbed Lotus Bane. This group was identified by cybersecurity experts in March 2023, though it is believed to have been...

Network tunneling QEMU

Cyberattack Uncovered: Network Tunneling with QEMU

In a sophisticated cyberattack targeting a major corporation, malefactors employed the open-source QEMU hypervisor platform as a tool for creating a network tunnel. QEMU, a free emulator and hypervisor, facilitates the operation of various...