Hacking 2023    2026()  2025()  2024()  2023()

26.12.23

RTF template injection

Injection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption Beyond APT Actors 

HACKING

Phishing

24.12.23

Insta-Phish-A-Gram

Following Trustwave SpiderLabs’ blog on social media-themed phishing on Facebook, comes another flavor of ‘infringement’ phishing. In this case, the targets, still under the umbrella of Meta, are Instagram users

HACKING

Phishing

9.12.23

5GHOUL

5Ghoul : Unleashing Chaos on 5G Edge Devices

HACKING

5G

8.12.23

Ongoing attacks

Star Blizzard increases sophistication and evasion in ongoing attacks

HACKING

Phishing

6.12.23

Fake Lockdown Mode

Fake Lockdown Mode: A post-exploitation tampering technique

HACKING

Apple

28.11.23

PERFORM NTLM FORCED AUTHENTICATION ATTACKS

ABUSING MICROSOFT ACCESS “LINKED TABLE” FEATURE TO PERFORM NTLM FORCED AUTHENTICATION ATTACKS

HACKING

Hacking

6.11.23

Agonizing Serpens

The attacks are characterized by attempts to steal sensitive data, such as personally identifiable information (PII) and intellectual property.

HACKING

Hacking

2.11.23

Kopeechka

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

HACKING

Tool

3.10.23

Authenticated Origin Pulls (mTLS)

When visitors request content from your domain, Cloudflare first attempts to serve content from the cache. If this attempt fails, Cloudflare sends a request — or an origin pull — back to your origin web server to get the content.

HACKING

Hacking

3.10.23

Silent Skimmer

Silent Skimmer: Online Payment Scraping Campaign Shifts Targets From APAC to NALA

HACKING

Hacking

1.10.23

ZeroFont phishing technique

ZeroFont phishing technique

HACKING

Phishing

14.9.23

Repo Jacking

Repo Jacking: Exploiting the Dependency Supply Chain

HACKING

Hacking

24.7.23

drIBAN

Uncovering drIBAN fraud operations. Chapter 3: Exploring the drIBAN web inject kit

HACKING

Hacking

4.7.23

HTML Smuggling

HTML Smuggling: The Hidden Threat in Your Inbox

HACKING

Hacking

1.7.23

Proxyjacking

Proxyjacking: The Latest Cybercriminal Side Hustle

HACKING

Hacking

28.6.23

Process Mockingjay

Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution

HACKING

Hacking