FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Cybercriminals Using EvilProxy Phishing Kit to Target Senior Executives in U.S. Firms

By: Newsroom β€” October 9th 2023 at 12:36
Senior executives working in U.S.-based organizations are being targeted by a new phishing campaign that leverages a popular adversary-in-the-middle (AiTM) phishing toolkit namedΒ EvilProxyΒ to conduct credential harvesting and account takeover attacks. Menlo Security said the activity started in July 2023, primarily singling out banking and financial services, insurance, property management and
☐ β˜† βœ‡ The Hacker News

Chinese Hackers Target Semiconductor Firms in East Asia with Cobalt Strike

By: Newsroom β€” October 6th 2023 at 11:49
Threat actors have been observed targeting semiconductor companies in East Asia with lures masquerading as Taiwan Semiconductor Manufacturing Company (TSMC) that are designed to deliver Cobalt Strike beacons. The intrusion set, perΒ EclecticIQ, leverages a backdoor called HyperBro, which is then used as a conduit to deploy the commercial attack simulation software and post-exploitation toolkit.
☐ β˜† βœ‡ The Hacker News

Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware

By: Ravie Lakshmanan β€” December 6th 2022 at 06:11
A version of an open source ransomware toolkit calledΒ CryptoniteΒ has been observed in the wild with wiper capabilities due to its "weak architecture and programming." Cryptonite, unlike other ransomware strains, is not available for sale on the cybercriminal underground, and was instead offered for free by an actor named CYBERDEVILZ until recently through a GitHub repository. The source code and
☐ β˜† βœ‡ The Hacker News

FBI, CISA, and NSA Reveal How Hackers Targeted a Defense Industrial Base Organization

By: Ravie Lakshmanan β€” October 5th 2022 at 08:12
U.S. cybersecurity and intelligence agencies on Tuesday disclosed that multiple nation-state hacking groups potentially targeted a "Defense Industrial Base (DIB) Sector organization's enterprise network" as part of a cyber espionage campaign. "[Advanced persistent threat] actors used an open-source toolkit calledΒ ImpacketΒ to gain their foothold within the environment and further compromise the
❌