Category cyber-attacks

Iranian APT Group Attempts to Compromise Governments in Kuwait and Saudi Arabia

Iranian Cyber Espionage Campaign Targeting Kuwait and Saudi Arabia’s Critical Infrastructure Recent reports from cybersecurity researchers have unveiled a sophisticated Iranian cyber espionage operation aimed at critical infrastructures in Kuwait and Saudi Arabia. The campaign, attributed to the Chafer APT (also referred to as APT39 or Remix Kitten), has been…

Read MoreIranian APT Group Attempts to Compromise Governments in Kuwait and Saudi Arabia

The Latest DOJ Release: What the ‘Epstein’s Suicide’ Video Really Reveals

Emerging Concerns Over a Viral Video Allegedly Linked to Jeffrey Epstein’s Death A recently surfaced 12-second video claiming to depict Jeffrey Epstein’s suicide in his prison cell has begun circulating on social media platforms, following the latest release of documents from the Department of Justice (DOJ). However, the associated documentation…

Read MoreThe Latest DOJ Release: What the ‘Epstein’s Suicide’ Video Really Reveals

New ComRAT Malware Leverages Gmail for Command Reception and Data Exfiltration

Recent cybersecurity investigations have revealed an upgraded variant of the ComRAT backdoor, a sophisticated tool initially deployed by the Turla Advanced Persistent Threat (APT) group. This latest iteration utilizes Gmail’s web interface to clandestinely receive commands and exfiltrate sensitive information. Cybersecurity firm ESET reported that ComRAT version 4, first identified…

Read MoreNew ComRAT Malware Leverages Gmail for Command Reception and Data Exfiltration

Justice Department Unveils Additional Epstein Files, Lacking Key Documents Desired by Survivors

The Justice Department has released three additional data sets related to Jeffrey Epstein, following a substantial prior disclosure of nearly 4,000 documents. This release coincided with the deadline imposed by the Epstein Files Transparency Act, which mandates greater public access to information regarding Epstein and his associates. The newly released…

Read MoreJustice Department Unveils Additional Epstein Files, Lacking Key Documents Desired by Survivors

New USB-C Espionage Tool Steals Data from Air-Gapped Computers

New Malware Threat Targets Air-Gapped Systems in Southeast Asia Recent research from Kaspersky has unveiled that a sophisticated Chinese threat actor, identified as Cycldek, has enhanced its capabilities to attack air-gapped systems with the intent of exfiltrating sensitive information for espionage purposes. Cycldek, also known as Goblin Panda or Conimes,…

Read MoreNew USB-C Espionage Tool Steals Data from Air-Gapped Computers

Magecart Exploits Insecure S3 Buckets on Emergency Services Websites

Hacker Groups Exploit Misconfigured AWS S3 Buckets to Inject Malicious Code into Websites In a stark reminder of ongoing cybersecurity threats, various hacking groups are increasingly exploiting vulnerabilities in misconfigured Amazon S3 data storage buckets to infiltrate websites with malicious code. This tactic is primarily aimed at capturing sensitive information,…

Read MoreMagecart Exploits Insecure S3 Buckets on Emergency Services Websites

Spies Can Eavesdrop on Your Conversations by Observing a Light Bulb in the Room

Recent advancements in cybersecurity have unveiled an alarming technique capable of remote eavesdropping using standard light bulbs as conduits. Researchers have demonstrated that by observing variations in the light emitted by a bulb in a room, they can effectively intercept conversations from a nearby location. This innovative method, termed “Lamphone,”…

Read MoreSpies Can Eavesdrop on Your Conversations by Observing a Light Bulb in the Room

Hackers Impersonate HR Professionals to Target Military and Aerospace Personnel with Fake Job Offers

Targeted Cyber-Espionage Campaign Hits Aerospace and Military Sectors Cybersecurity researchers have unveiled a sophisticated cyber-espionage campaign that specifically targets aerospace and military organizations across Europe and the Middle East. This initiative, termed “Operation In(ter)ception,” reportedly aimed to infiltrate and monitor key personnel within these firms while also attempting to extract…

Read MoreHackers Impersonate HR Professionals to Target Military and Aerospace Personnel with Fake Job Offers