Ghost Calls: New C2 Technique Abuses Zoom and Teams to Evade Detection Post Views: 31 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A newly disclosed command-and-control (C2) evasion technique dubbed Ghost Calls...
New ‘Plague’ Malware Evades Detection for a Year, Hijacks Linux SSH Authentication Post Views: 14 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A newly uncovered Linux backdoor named Plague has been...
Critical RCE Flaw in WordPress ‘Alone’ Theme Under Mass Exploitation Post Views: 19 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Threat actors are actively exploiting a critical vulnerability in the...
New macOS ‘Sploitlight’ Flaw Bypasses Privacy Controls to Exfiltrate Sensitive Data Post Views: 29 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Apple has patched a critical macOS vulnerability that...
Scattered Spider Hacks VMware ESXi via Help Desk Social Engineering Post Views: 14 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes Scattered Spider, a notorious financially motivated threat group, has escalated its...
Koske Malware Hides in Panda JPEGs to Deploy Crypto Miners on Linux Post Views: 11 Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos. Reading Time: 3 Minutes A new Linux malware named Koske is exploiting misconfigured JupyterLab environments...