Forged Driver Signatures Exploited In The Wild

Loopholes in Microsoft rules of certificate handling allow hackers to legitimise malware

Hackers actively use driver signature spoofing, which originates from a loophole in Windows kernel-mode drivers handling mechanism. They heavily bear on open-source utilities that were primarily designed for temporal circumvention of drivers signing, which is a far too big delay when it comes to evaluations. Cybercriminals though do not do any tests, and do hit… Continue reading Forged Driver Signatures Exploited In The Wild

Legion Stealer targeting PUBG players

Legion Tool Steals PUBG Players’ Sensitive Data through a Fake GitHub Repo

Scammers are using a misleading GitHub page to distribute Legion Stealer to fans of rogue PUBG games. Under the guise of cheats, users download malware. Legion Stealer Attacks PUBG Players Cyble Research and Intelligence Labs (CRIL) recently uncovered a fraudulent GitHub page pretending to be a PUBG bypass hack project. However, instead of providing game… Continue reading Legion Stealer targeting PUBG players

Bed Bath & Beyond Shopping Scams

Cybercriminals use the sell-off of a bankrupted retailer to scam people

In late April, 2023, American home goods retailer Bed Bath & Beyond filed for bankruptcy protection under Chapter 11. This event was expected, due to the company’s poor performance over the last quarter before the bankruptcy. Though, not only short sellers decided to make profit on this: online scammers decided to fool people, appealing to… Continue reading Bed Bath & Beyond Shopping Scams

Proxyjacking: The Latest Cybercriminal Invention In Action

Attackers hack into devices and turn them into proxy servers to make a profit

Today, in the constantly changing world of cyber threats, attackers always look for new ways to get more benefits with less effort. Recently, researchers found an example of this and called it proxyjacking for profit. What is proxyjacking? Proxyjacking is an attacker’s illegal use of a victim’s bandwidth for its own good. The closest related… Continue reading Proxyjacking: The Latest Cybercriminal Invention In Action

Akira Ransomware Decryptor Is Available To The Public

If you are a victim of Akira Ransomware, we have good news for you.

Cybersecurity experts have released a decryptor for the Akira ransomware. It will allow victims who encounter attacks to decrypt their files without paying a ransom. Akira ransomware decryptor released to the public Cybersecurity firm Avast recently released a free decryptor for Akira ransomware. This tool can help victims recover their data without paying any money… Continue reading Akira Ransomware Decryptor Is Available To The Public

Super Mario Malware: Hackers Spread Stealers in the Fake Game

SupremeBot malware is being spread through a Trojanized Super Mario Game Installer.

The Super Mario video game franchise has gained immense acclaim due to its platforming gameplay, lively visuals, memorable characters. Recently, the franchise has experienced a renewed surge in popularity with the release of new games and animated movies. The franchise has consistently evolved by introducing innovative game mechanics, power-ups, and levels across titles and gaming… Continue reading Super Mario Malware: Hackers Spread Stealers in the Fake Game

How Can Companies Be Secure Against Cyberattacks?

Companies need to pay attention to the rise in data breaches and the risks cyberattacks.

Organizations face an alarming reality in the digital world: data breaches and cyberattacks are becoming more frequent. Cybercriminals find more opportunities to exploit vulnerabilities as reliance on technology grows, and personal information is collected, stored. One of the primary methods that bad actors use to scam companies is social engineering attacks. Let’s look at crucial… Continue reading How Can Companies Be Secure Against Cyberattacks?

How to Protect Your Digital Footprint

Attackers can use a company's digital footprint for bad intentions.

The modern business world has been greatly advanced by the internet. Its convenience and numerous benefits have made people from all over the world reliant on the digital world. As the use of digital platforms continues to increase, businesses of all sizes should consider their digital footprint. What is Corporate Digital Footprint? Your company’s digital… Continue reading How to Protect Your Digital Footprint

BreachForums Is Back Online, Led by ShinyHunters

It is quite an uncommon occasion when black hat hackers takeover the ceased Darknet forum

BreachForums, an infamous Darknet forum that was shut down in late March 2023, is back online since approx. June 13 2023. After 3 months offline, it is revived by a hacker group called ShinyHunters. But will Breached be as successful as they used to be? What is BreachForums? Breached Forums used to be a massive… Continue reading BreachForums Is Back Online, Led by ShinyHunters