Hijack
- APPLICATIONS
FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites
Apr 02, 2025Ravie LakshmananRansomware / Email Security The financially motivated threat actor known as FIN7 has been linked to a…
Read More » - APPLICATIONS
Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images
Mar 31, 2025Ravie LakshmananData Theft / Website Security Threat actors are using the “mu-plugins” directory in WordPress sites to conceal…
Read More » - SECURITY
Fresh fighting in eastern DR Congo, global trade update, elections in CAR, Pakistan train hijack — Global Issues
Over 850,000 civilians have been displaced in South Kivu province, nearly half of them children, according to the agency. Many…
Read More » - SECURITY
Gunmen hijack train in Pakistan’s Balochistan, take hundreds hostage | Conflict News
DEVELOPING STORYDEVELOPING STORY, Balochistan Liberation Army claims responsibility for attack on train travelling from Quetta to Peshawar. Islamabad, Pakistan –…
Read More » - APPLICATIONS
PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices
Feb 27, 2025Ravie LakshmananVulnerability / Network Security A new malware campaign has been observed targeting edge devices from Cisco, ASUS,…
Read More » - APPLICATIONS
GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets
Feb 25, 2025Ravie LakshmananGaming / Threat Intelligence Cybersecurity researchers are calling attention to an ongoing campaign that’s targeting gamers and…
Read More » - APPLICATIONS
Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes
Feb 19, 2025Ravie LakshmananMobile Security / Cyber Espionage Multiple Russia-aligned threat actors have been observed targeting individuals of interest via…
Read More » - APPLICATIONS
Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts
Feb 14, 2025Ravie LakshmananEnterprise Security / Cyber Attack Microsoft is calling attention to an emerging threat cluster it calls Storm-2372…
Read More » - APPLICATIONS
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
Feb 12, 2025Ravie LakshmananIT Security / Cybercrime The North Korea-linked threat actor known as Kimsuky has been observed using a…
Read More » - APPLICATIONS
Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts
Feb 01, 2025Ravie LakshmananMalvertising / Mobile Security Cybersecurity researchers have discovered a malvertising campaign that’s targeting Microsoft advertisers with bogus…
Read More »