EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware

The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including backdoors and information stealers such as Rhadamanthys and StealC.
“In t… Continue reading EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware

Posted in Uncategorized

RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment

The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor’s tradecraft.
The activity, observed by Romanian cybersecurity company Bitdefender, involves the depl… Continue reading RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment

Posted in Uncategorized

Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks

Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosyste… Continue reading Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks

Posted in Uncategorized

Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

“A boxer derives the greatest advantage from his sparring partner…”
— Epictetus, 50–135 AD

Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and—BANG—lands a… Continue reading Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

Posted in Uncategorized