Zero-Day
Zero-Day

Zero-Day

It may seem like there are endless cybersecurity threats out there. Among them, one sounds particularly ominous—the zero-day exploit. This is when hackers crawl software to find a security flaw developers missed. In most cases, no one knows this flaw exists until it’s too late and hackers have already used the vulnerability to their advantage. Whats is Zero-Day A zero-day exploit is when hackers discover a software gap or flaw they can use to gain access to users’ information or computers. By the time the gap is discovered by developers, it’s typically already being used by cybercriminals, hence the name...

New BlackCat Ransomware
New BlackCat Ransomware

New BlackCat Ransomware

Microsoft on Thursday disclosed that it found a new version of the BlackCat ransomware (aka ALPHV and Noberus) that embeds tools like Impacket and RemCom to facilitate lateral movement and remote code execution. “The Impacket tool has credential dumping and remote service execution modules that could be used for broad deployment of the BlackCat ransomware in target environments,” the company’s threat intelligence team said in a series of posts on X (formerly Twitter). “This BlackCat version also has the RemCom hacktool embedded in the executable for remote code execution. The file also contains hardcoded compromised target credentials that actors use...

Ransomware
Ransomware

Russian malware “Infamous Chisel” targeted the Ukrainian army

Cybersecurity and intelligence laboratories in Canada, New Zealand, the United Kingdom and the United States of Australia on Thursday disclosed details of a type of mobile malware that targets Android devices used by the Ukrainian military. The malicious software, dubbed Infamous Chisel and attributed to a Russian state-sponsored actor called Sandworm, has capabilities to “enable unauthorized access to compromised devices, scan files, monitor traffic, and periodically steal sensitive information.” Some aspects of the malware were uncovered by the Security Service of Ukraine (SBU) earlier in August, highlighting unsuccessful attempts on part of adversaries to penetrate Ukrainian military networks and gather...

Zero-Day
Zero-Day

Zero-Day

It may seem like there are endless cybersecurity threats out there. Among them, one sounds particularly ominous—the zero-day exploit. This is when hackers crawl software to find a security flaw developers missed. In most cases, no one knows this flaw exists until it’s too late and hackers have already used the vulnerability to their advantage. Whats is Zero-Day A zero-day exploit is when hackers discover a software gap or flaw they can use to gain access to users’ information or computers. By the time the gap is discovered by developers, it’s typically already being used by cybercriminals, hence the name...

Anonymous Hackers
Anonymous Hackers

Identifying Anonymous Hackers

Undoubtedly, you have heard many times in different media about the hacking of sites and sensitive information by a group of anonymous hackers. This time we are going to identify these people. With the emergence of social networks and internet forums, new protests were formed under the name of hacktivism, which together with this term, groups and individuals have been active in the cyberspace as hacktivists in the form of internet protests. One of these groups that have high capabilities in hacking and infiltrating and organizing cyber attacks is a group known as anonymous hackers. Anonymous Hackers The first activities...

zone-h
zone-h

Zone-h

Zone-h is not just a website, but a playground for hackers from all over the world. Zone-h Org At first glance, the Zone-h.org website is just a website for registering and archiving defiances made by hackers. But if we pay a little deeper and more detailed attention to it, we will notice more important things from this website.The main function of this website is to investigate claims of website hacking and to register and archive it. But this review is not just an analysis of the image or slogan of hacktivists or hackers, but an analysis of the web server,...