News & Updates

The U.S. DoJ charges 12 Chinese nationals for state-linked cyber operations

The U.S. Department of Justice (DoJ) charges 12 Chinese nationals for their alleged involvement in state-linked cyber operations. The U.S. DoJ charged 12 Chinese nationals, including PRC security officers, employees of the hacking firm i-Soon, and members of the APT27 group (aka Emissary Panda, TG-3390, Bronze Union, and Lucky Mouse), for data theft and suppressing dissent worldwide. “The Justice […]
Cybersecurity Tools

Unmasking GrassCall Campaign: The APT Behind Job Recruitment Cyber Scams

Table of content: Introduction Overview of Threat actor. Infection Chain. Attack tactics & Approach: Impersonating a Fake Company: Phishing Communication: Malicious Software Deployment: Infection Chain Technical Analysis of GrassCall.exe: Analysis of Rhadamanthys malware TTPs: Preventive measures: IoCs & Detections in Seqrite: Introduction: The “GrassCall” malware campaign represents an advanced social engineering attack carried out by […]

The post Unmasking GrassCall Campaign: The APT Behind Job Recruitment Cyber Scams appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

News & Updates

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could result in arbitrary code execution.
The vulnerability, tracked as CVE-2025-25012, carries a CVSS score of 9.9 out of a maximum of 10.0. It has been described as a case of prototype pollution.
“Prototype pollution in Kibana leads to
News & Updates

EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing campaigns to deploy information stealers and ransomware, while also working on a new product called EncryptRAT.
“EncryptHub has been observed targeting users of popular applications, by distributing trojanized versions,” Outpost24 KrakenLabs said in a new report shared with The
News & Updates

Outsmarting Cyber Threats with Attack Graphs

Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to stay secure. Instead, they need a dynamic approach that provides real-time insights into how attackers move through their environment.
This is where attack graphs come in. By mapping potential attack paths
Exit mobile version