Tushar Subhra Dutta
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.
Red Menshen APT Group Deploying BPFDoor in Linux Kernel
APTs Red Menshen expands targets to Linux and cloud servers, as seen in ransomware attacks on VMware ESXi, Mirai botnet variations, and cloud-focused stealers and crypto miners.APT groups extend focus beyond Windows, signified by Sandworm's attacks on Linux-based routers....
Re-released Apple WebKit Zero-Day Patch Fixes Website Breaking
Apple has recently released new Rapid Security Response (RSR) patches to fix a zero-day vulnerability. This vulnerability has been exploited in attacks and affects iPhones, Macs, and iPads that have been fully patched.The zero-day vulnerability has been tracked as...
Hackers Leverage USB Flash Drives to Attack Public and Private Sectors Globally
During the initial half of 2023, a notable surge occurred in attacks exploiting infected USB drives for secret theft.While the USB-based operation campaigns caused most incidents, impacting both public and private sectors worldwide.Cybersecurity analysts at Mandiant Managed Defense recently...
Hackers use Rekoobe Backdoor to Attack Linux Systems
Rekoobe is a notorious backdoor that primarily targets Linux environments, and it's actively exploited by the threat actors, mainly a Chinese threat group, APT31.This notorious backdoor was discovered in 2015 for the first time, while an updated version of...
Letscall – New Sophisticated Voice over IP Phishing Attack Steal Banking Details
Vishing's popularity has surged significantly in recent years, and this phenomenon is gradually destroying the trust factor in unknown calls from numbers that are unknown due to the rise in Voice over IP Phishing.Commonly, calls from bank employees or...
BlackByte 2.0 Ransomware Employs Wide Range of Tools in 5 Days
The rapid rise and sophistication of ransomware enable threat actors to launch attacks more frequently and disrupt businesses and organizations that are lacking adequate preparation.The researchers at Microsoft Incident Response recently investigated an intrusion in which it's been the...