New Golang Backdoor Uses Telegram API for Covert Command and Control Post Views: 14 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Telegram as a Malware C2 Channel Cybersecurity researchers at Netskope have...
FinalDraft Malware Uses Outlook Drafts for Covert C2 Post Views: 6 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Targeted Attacks Against a Government Ministry A newly discovered malware named FinalDraft has been...
whoAMI Attack Lets Hackers Gain Code Execution in AWS Accounts via AMI Name Confusion Post Views: 5 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Security researchers have uncovered a name confusion attack that...
Critical SonicWall VPN Flaw Lets Hackers Hijack Sessions Post Views: 10 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Security researchers at Bishop Fox have published full exploitation details for...
Massive Brute Force Attack Using 2.8 Million IPs Targets Networking Devices Post Views: 5 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A large-scale brute force attack is underway, attempting to guess login...
Hackers Spoof Microsoft ADFS Login Pages to Steal Credentials and Bypass MFA Post Views: 42 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A phishing campaign is targeting Microsoft Active Directory Federation...