Threat Actors Use Several New Advanced Techniques To Exploit Windows Services

  According to the cybersecurity researchers, several fresh techniques, comparatively advanced — are being used by attackers, for exploiting legitimate Windows services to accelerate low-level privileges into the system (concept and practice of restricting access rights for users, accounts, and computing processes to only those resources required to perform routine, legitimate activities, least privilege is […]

Continue Reading

Domestic Kitten – An Iranian Surveillance Operation

  Check Point researchers as of late revealed the full degree of Domestic Kitten’s broad surveillance operation against Iranian residents that could pose a threat to the security of the Iranian system. The actual operation is linked to the Iranian government and executed by APT-C-50. Started in 2017, this operation comprised 10 unique campaigns, targeted […]

Continue Reading

Chinese State-Sponsored Hackers Exploiting Zerologon Vulnerability

  Chinese state-sponsored threat actors have been observed exploiting the Zerologon vulnerability in a global campaign targeting businesses from multiple industries in Japan and 17 other regions across the world including the United States and Europe. The attacked industries include engineering, automotive, managed service providers, and pharmaceutical.  According to the information gathered by Symantec’s Broadcom […]

Continue Reading

Hackers Use Backdoor to Infiltrate Governments and Companies, Motive, not Money.

According to findings by cybersecurity firms Avast and ESET, an APT (Advanced Persistent Threat) cyberattack targeted companies and government authorities in Central Asia, using backdoors to gain entry into company networks for a long period. The targets involved telecom companies, gas agencies, and one government body in Central Asia. APT attacks, unlike other cyberattacks, don’t […]

Continue Reading

Another Chinese state-sponsored hacking groups discovered – would be the fourth one to be found

A group of cyber security analyst, Intrusion Truth have found their fourth Chinese state-sponsored hacking operation APT 40. “APT groups in China have a common blueprint: contract hackers and specialists, front companies, and an intelligence officer,” the Intrusion Truth team said. “We know that multiple areas of China each have their own APT.” APT stands […]

Continue Reading