#threat-actors

[ follow ]
fromThe Hacker News
1 week ago

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

The threat actor leveraged combinations of sophisticated and stealthy techniques creating multilayered attack kill chains to facilitate access to restricted and segmented network assets within presumed to be isolated environments.
Information security
#ransomware
Cryptocurrency
fromThe Hacker News
4 months ago

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Affiliates from the Black Basta ransomware group are transitioning to CACTUS, sharing malicious tools to maintain persistent control over infected systems.
Cryptocurrency
fromThe Hacker News
4 months ago

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Affiliates from the Black Basta ransomware group are transitioning to CACTUS, sharing malicious tools to maintain persistent control over infected systems.
#cybersecurity
Privacy professionals
fromThe Hacker News
1 week ago

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware

EncryptHub targets Web3 developers with evolved tactics using fake AI platforms for information stealer malware infections.
Privacy technologies
fromThe Hacker News
4 weeks ago

Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

Threat actors are weaponizing generative AI tools like Vercel's v0 to create realistic phishing sites easily.
Information security
fromThe Hacker News
3 weeks ago

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

Hackers are exploiting Shellter, a red teaming tool, for malfeasance, distributing stealer malware following a leaked version.
Information security
fromThe Hacker News
3 months ago

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Fortinet warns that attackers maintain read-only access to vulnerable FortiGate devices by exploiting symlinks, despite patching initial vulnerabilities.
fromThe Hacker News
3 months ago

North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages

The packages in question, which were collectively downloaded more than 5,600 times prior to their removal, are listed below -
Node JS
fromITPro
4 months ago

Oracle breach claims spark war of words with security researchers

The threat actor has demonstrated sophisticated capabilities by targeting a critical authentication infrastructure, suggesting an organized and persistent threat operation.
Information security
[ Load more ]