VPN Apps Removed from Russian App Store Sparks Controversies

Apple recently yielded to government pressure and removed several virtual private network (VPN) apps from the Russian App Store. The action affected 25 mobile VPN service providers, including ProtonVPN, NordVPN, Red Shield VPN, and Le VPN, as reported by MediaZona. Le VPN expressed dissatisfaction, citing non-compliance with Article 15.1 of the Federal Law dated July 27, […]

Zergeca Botnet Becomes a Formidable DDoS Threat

Cybersecurity researchers recently confirmed the existence of Zergeca, a powerful botnet written in Golang. Unlike typical DDoS botnets, Zergeca boasts an impressive array of capabilities, including support for six different attack methods, proxying, scanning, self-upgrading, persistence, file transfer, reverse shell functionality, and sensitive device information collection. QiAnXin XLab, the research team behind the discovery, emphasized […]

Multiple Websites Suffer the Effects of Hijack Polyfill Supply Chain Attack

According to a report by Sansec, no fewer than 110,000 sites using polyfill.io have suffered the effects of a supply chain attack orchestrated by a Chinese-owned company. Details about the incident revealed that after acquiring the domain, the Chinese company now redirects all traffic to a malicious website designed to scam victims through a modified […]

FIN9-Linked Vietnamese Hackers In Trouble Over $71M Cybercrime

An unsealed indictment charges four Vietnamese nationals with involvement in a series of cyber intrusions that collectively caused U.S. companies to suffer over $71 million in losses. The defendants—Ta Van Tai (also known as Quynh Hoa and Bich Thuy), Nguyen Viet Quoc (aka Tien Nguyen), Nguyen Trang Xuyen, and Nguyen Van Truong (aka Chung Nguyen)—were […]

Crypto Users Might be In Trouble of Markopolo’s Scam

Recent investigations by cybersecurity experts have unveiled the operations of ‘Markopolo’, a sophisticated cybercriminal mastermind orchestrating extensive cryptocurrency thefts. This threat actor has been systematically targeting users across various social media platforms, employing a potent information-stealing malware. In-depth analysis reveals that this malware is disseminated via ‘Vortax’, a commonly used virtual meeting application, along with […]

Indian Government Under Cyberattack Orchestrated by Pakistani Hackers.

According to cybersecurity researchers, the Indian government is currently under attack by a suspected Pakistan-based possible state-sponsored threat actor. The report suggests the threat actor is leveraging the use of DISGOMOJI (the same all-in-one espionage tool discovered by Blackberry in connection with an attack campaign mounted by the Transparent Tribe actor) malware written in Golang […]

Oracle is Currently Under Attack Due to Web Server OS Command Injection Flaw

A report from CISA confirmed adding an actively exploited security flaw tagged CVE-2017-3506with CVSS score of 7.4 affecting the Oracle WebLogic Server to the Known Exploited Vulnerabilities (KEV) catalog due to active exploitation to obtain unauthorized access and obtain unrestricted control. The official statement by the agency reads; “Oracle WebLogic Server, a product within the […]

Credential Stuffing Attack is Possible! Okta Warns

A statement by Okta confirms the possibility of cross-origin authentication. It warns customers that they might become victims of this Customer Identity Cloud (CIC) vulnerability, which could promote credential-stuffing attacks by cybercriminals. Further details about the situation reveal that Okta has started warning customers with the features turned on since April 15, 2024. “We observed […]

BreachForum is Back in Business

Cybersecurity researchers and dark web trackers have brought security agencies’ attention to the return of the famous cybercriminal called BreachForum. This is happening barely two weeks after the confiscation and destruction of BreachForums’ infrastructure by the FBI (Federal Bureau of Investigation) in a coordinated raid. More reports from the researchers revealed one of the destroyed […]

Python, Golang and Rust Malware Deployed on Indian Targets 

Cybersecurity researchers have uncovered the actions of Transparent Tribe, a Pakistani-linked threat actor, who used malware written in Python, Golang, and Rust to attack the Indian government, defence, and aerospace sectors.  The attack done through a spear-phishing campaign also involves abuse of Discord, Google Drive, Slack and Telegram, which suggests threat actors now leverage legitimate programs […]