Tag: Abuse
-
North Korean Hackers Abuse DMARC To Legitimize Their Emails
DMARC is targeted by hackers as this serves to act as a preventative measure against email spoofing and phishing attempts. They …
-
RDP Abuse Present in 90% of Ransomware Breaches
Remote desktop protocol (RDP) compromise has reached record levels in ransomware attacks, according to new data from Sophos. The UK-based …
-
Hackers Abuse Document Publishing (DDP) Websites to Launch Cyber Attacks
Threat actors have been observed hosting phishing documents on legitimate digital document publishing (DDP) sites as part of continuous …
-
Hackers Abuse Amazon & GitHub to Deploy Java-based Malware
Hackers target these platforms due to their hosting of valuable resources and data. For financial gain or some other bad motive, the …
-
Hackers Abuse QEMU Hardware Emulator for Stealthy C2 Communication
QEMU is an open-source platform that provides a secure and private virtualized space for trying out malicious codes, exploits, and attacks …
-
Hackers Abuse Telegram API To Exfiltrate User Information
Attackers have been using keywords like “remittance” and “receipts” to spread phishing scripts using Telegram to steal user data …
-
Business Logic Abuse Dominates as API Attacks Surge
APIs now comprise nearly three-quarters (71%) of web traffic, posing a significant threat to corporate cybersecurity by expanding the …
-
Global Coalition and Tech Giants Unite Against Commercial Spyware Abuse
A coalition of dozens of countries, including France, the U.K., and the U.S., along with tech companies such as Google, MDSec, Meta, and …
-
Thousands of Dark Web Posts Expose ChatGPT Abuse Plans
The cybersecurity researchers at Kaspersky have uncovered more than 3,000 posts on the dark web, where threat actors seek to abuse or …
-
Multichain Inferno Drainer Abuse Web3 Protocols To Connect Crypto Wallets
A cryptocurrency-related phishing scam that uses malware called a drainer is one of the most widely used tactics these days. From November …
-
Hackers Abuse GitHub to Host Malicious Infrastructure
GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution (DDR), …
-
Hackers Abuse Bot Protection Tool to Launch Cyber Attacks
Predator, a bot protection tool designed to fight against bots and crawlers, has now been found to be abused by threat actors for malicious …
●●●