I have run out of severance and now I'm running out of savings. It's do or die now, folks. Job offers, job leads, job hunting advice...please send them all my way, and/or boost for reach. Freelancing is on the table, too. Details about me and what I'm looking for, to follow.
Security researchers have discovered a new variant of Phobos ransomware in the wild that uses an Office document for propagation. Named FAUST, the ransomware is the latest iteration of the Phobos family after Eking, Eight, Elbie, Devos, and 8Base....
AT&T researchers have come across a phishing attack that leveraged the Microsoft Teams chat group to push DarkGate malware onto victims’ systems. The attackers used a domain named .onmicrosoft.com to send phishing messages, tricking users into downloading a deceptive file....
The cybersecurity landscape has witnessed a new, sophisticated threat in the form of ApateWeb, a large-scale scareware and Potentially Unwanted Programs (PUPs) delivery campaign. Uncovered by Unit 42 researchers at Palo Alto Networks, the campaign is notable for its use of over 130,000 domains to propagate various forms of...
In the dynamic realm of cybersecurity, the demand for hackers has surged, and the quest for reputable platforms connecting clients with skilled professionals is more crucial than ever. This article serves as a guide for individuals and organizations seeking to fortify their digital defenses through hacking collaborations....
In recent years, the proliferation of advanced spyware has raised concerns about the privacy and security of smartphones. Among the most notorious examples is Pegasus, a sophisticated surveillance tool developed by the Israeli company NSO Group. In this article, we'll delve into how hackers can exploit smartphones with Pegasus...
In today's interconnected world, social media has become an integral part of our daily lives. From sharing updates with friends to networking with professionals, these platforms offer a myriad of opportunities. However, with great convenience comes great risk, as hackers continually evolve their tactics to compromise user...
Researchers discovered a new campaign by the North Korea-sponsored ScarCruft group targeting media organizations and high-profile experts in North Korean affairs. The campaign was first observed in December 2023 and was aimed at harvesting threat intelligence and defense strategies from organizations and experts....
Trend Micro observed the Water Curupira actively propagating the Pikabot loader malware as part of campaigns, more aggressively in Q4 2023. Water Curupira is a Black Basta ransomware affiliate....
The shadowy realm of darkweb hacker-for-hire services plunged into chaos as two formidable entities, anonymous-hackers-for-hire.com and hellboundhackers.org, engage in a high-stakes cyber war. This article delves into the intricate details of their clash, exploring the events that unfolded and the repercussions reverberating...
AerCap, the world's largest aircraft leasing company, has reported a ransomware infection that occurred earlier this month, but claims it hasn't yet suffered any financial losses yet and all its systems are under control....
About 16.6 million LoanDepot customers had their “sensitive personal” information” stolen in a cyberattack earlier this month, which the loan and mortgage giant has described as a ransomware attack....
Jamf Threat Labs researchers warned against pirate applications distributing a backdoor to macOS users. The researchers noticed the apps appeared similar to ZuRu malware and allowed attackers to download and execute multiple payloads to compromise machines....
Researchers have identified an ongoing cryptojacking campaign, EleKtra-Leak, that targets exposed Identity and Access Management (IAM) credentials on GitHub repositories. The campaign has been active since December 2020, with as many as 474 unique Amazon EC2 instances found being used to mine Monero cryptocurrency between August...
The Russian-linked Turla hacking group has been observed using a new version of Kazuar backdoor to expand its attacks. The new findings come from Palo Alto Networks Unit 42, which has been tracking the adversary under the name Pensive Ursa....
A previously undocumented proxy botnet called Socks5Systemz is being distributed via PrivateLoader and Amadey malware loaders to infect computers worldwide. According to researchers, the botnet has been around since 2016 but remained under the radar only to be discovered recently....
The North Korea-based BlueNoroff APT group has been linked with a new malware strain that is being used to target macOS systems. Dubbed ObjCShellz, the malware shares similarities with the RustBucket malware campaign, which came to light earlier this year....
A new set of malicious Python packages has been discovered on the Python Package Index (PyPI) repository. These packages masquerade as harmless obfuscation tools but contain a malware called BlazeStealer, reported Checkmarx....
Beware! Researchers are warning about a rise in crypto spam and scam messages that leverage the "Release scores" feature of Google Forms quizzes to deliver emails. These spam messages ask victims to invest in crypto or share their details....
The cybersecurity landscape is continuously evolving, with threat actors often changing tactics and branding to evade detection and expand their operations. A recent development in this arena involves the Royal ransomware gang. According to a joint advisory from the CISA and the FBI, this group has rebranded itself to BlackSuit....
A report by Sekoia.io has shed light on a targeted campaign against the gaming community that leverages Discord channels and fake download sites to distribute information-stealing malware. The incident came to light after the cloud gaming company Shadow warned its users that their data was compromised....
Phobos Ransomware Expands with New FAUST Variant
Security researchers have discovered a new variant of Phobos ransomware in the wild that uses an Office document for propagation. Named FAUST, the ransomware is the latest iteration of the Phobos family after Eking, Eight, Elbie, Devos, and 8Base....
DarkGate Malware Delivered via Microsoft Teams
AT&T researchers have come across a phishing attack that leveraged the Microsoft Teams chat group to push DarkGate malware onto victims’ systems. The attackers used a domain named .onmicrosoft.com to send phishing messages, tricking users into downloading a deceptive file....
ApateWeb: Large-Scale Campaign Delivers Scareware and PUPs
The cybersecurity landscape has witnessed a new, sophisticated threat in the form of ApateWeb, a large-scale scareware and Potentially Unwanted Programs (PUPs) delivery campaign. Uncovered by Unit 42 researchers at Palo Alto Networks, the campaign is notable for its use of over 130,000 domains to propagate various forms of...
How to hire a hacker : Leveraging Reputable Platforms for hiring a hacker "
In the dynamic realm of cybersecurity, the demand for hackers has surged, and the quest for reputable platforms connecting clients with skilled professionals is more crucial than ever. This article serves as a guide for individuals and organizations seeking to fortify their digital defenses through hacking collaborations....
Understanding the Threat of Pegasus Spyware: How Hackers Exploit Smartphones
In recent years, the proliferation of advanced spyware has raised concerns about the privacy and security of smartphones. Among the most notorious examples is Pegasus, a sophisticated surveillance tool developed by the Israeli company NSO Group. In this article, we'll delve into how hackers can exploit smartphones with Pegasus...
How to hack a social media account (Phishing method)
In today's interconnected world, social media has become an integral part of our daily lives. From sharing updates with friends to networking with professionals, these platforms offer a myriad of opportunities. However, with great convenience comes great risk, as hackers continually evolve their tactics to compromise user...
ScarCruft Returns to Target High-Profile Experts in N.Korea
Researchers discovered a new campaign by the North Korea-sponsored ScarCruft group targeting media organizations and high-profile experts in North Korean affairs. The campaign was first observed in December 2023 and was aimed at harvesting threat intelligence and defense strategies from organizations and experts....
Black Basta-Affiliate Spreads Pikabot
Trend Micro observed the Water Curupira actively propagating the Pikabot loader malware as part of campaigns, more aggressively in Q4 2023. Water Curupira is a Black Basta ransomware affiliate....
Cyber Warfare Unleashed: darkweb hacker for hire services at war
The shadowy realm of darkweb hacker-for-hire services plunged into chaos as two formidable entities, anonymous-hackers-for-hire.com and hellboundhackers.org, engage in a high-stakes cyber war. This article delves into the intricate details of their clash, exploring the events that unfolded and the repercussions reverberating...
TCE Exclusive: DENHAM the Jeanmaker Confirms Cyberattack
The cyberattack on DENHAM did not materially impact the brand's services in stores and online....
DDoS Barrage Hits Monobank, Ukraine’s Largest Mobile Bank, in Unprecedented Attack
The Monobank CEO did not attribute the attacks to any specific entity but noted that past threats had been linked to Russian hackers....
Slug slimes aerospace biz AerCap with ransomware, brags about 1TB theft
AerCap, the world's largest aircraft leasing company, has reported a ransomware infection that occurred earlier this month, but claims it hasn't yet suffered any financial losses yet and all its systems are under control....
LoanDepot says 16.6M customers had ‘sensitive personal’ information stolen in cyberattack
About 16.6 million LoanDepot customers had their “sensitive personal” information” stolen in a cyberattack earlier this month, which the loan and mortgage giant has described as a ransomware attack....
Unmasking MacOS Malware in Pirated Apps
Jamf Threat Labs researchers warned against pirate applications distributing a backdoor to macOS users. The researchers noticed the apps appeared similar to ZuRu malware and allowed attackers to download and execute multiple payloads to compromise machines....
Cryptojackers Use IAM Credential Within Five Minutes of Discovery
Researchers have identified an ongoing cryptojacking campaign, EleKtra-Leak, that targets exposed Identity and Access Management (IAM) credentials on GitHub repositories. The campaign has been active since December 2020, with as many as 474 unique Amazon EC2 instances found being used to mine Monero cryptocurrency between August...
Researchers Uncover a New Version of Kazuar Backdoor
The Russian-linked Turla hacking group has been observed using a new version of Kazuar backdoor to expand its attacks. The new findings come from Palo Alto Networks Unit 42, which has been tracking the adversary under the name Pensive Ursa....
Socks5Systemz Proxy Botnet Infects Around 10,000 Systems Worldwide
A previously undocumented proxy botnet called Socks5Systemz is being distributed via PrivateLoader and Amadey malware loaders to infect computers worldwide. According to researchers, the botnet has been around since 2016 but remained under the radar only to be discovered recently....
New ObjCShellz Malware Spotted Targeting macOS Systems
The North Korea-based BlueNoroff APT group has been linked with a new malware strain that is being used to target macOS systems. Dubbed ObjCShellz, the malware shares similarities with the RustBucket malware campaign, which came to light earlier this year....
New BlazeStealer Malware in PyPI Targets Developers
A new set of malicious Python packages has been discovered on the Python Package Index (PyPI) repository. These packages masquerade as harmless obfuscation tools but contain a malware called BlazeStealer, reported Checkmarx....
Threat Actors Impersonate Windows News Portal to Distribute RedLine Stealer
A new malvertising campaign has been observed wherein threat actors are copying a legitimate Windows news portal to distribute malware....
Spammers Abuse Google Forms Quizzes to Perform Scams
Beware! Researchers are warning about a rise in crypto spam and scam messages that leverage the "Release scores" feature of Google Forms quizzes to deliver emails. These spam messages ask victims to invest in crypto or share their details....
Royal Ransomware Rebrands as BlackSuit - Warn FBI and CISA
The cybersecurity landscape is continuously evolving, with threat actors often changing tactics and branding to evade detection and expand their operations. A recent development in this arena involves the Royal ransomware gang. According to a joint advisory from the CISA and the FBI, this group has rebranded itself to BlackSuit....
Researchers Uncover Info-Stealing Campaign Targeting Gaming Community
A report by Sekoia.io has shed light on a targeted campaign against the gaming community that leverages Discord channels and fake download sites to distribute information-stealing malware. The incident came to light after the cloud gaming company Shadow warned its users that their data was compromised....