Hacking  HOME  Reconnaissance(10)  Resource Development(8)  Initial Access(10)  Execution(14)  Persistence(20)  Privilege Escalation(14)  Defense Evasion(43)  Credential Access(17)  Discovery(32)  Lateral Movement(9)  Collection(17)  Command and Control(17)  Exfiltration(9)  Impact(14)

AI 

DATE

NAME

INFO

CATEGORY

SUBCATE

1.6.25 Browser in the Middle (BiTM) An adversary exploits the inherent functionalities of a web browser, in order to establish an unnoticed remote desktop connection in the victim's browser to the adversary's system. The adversary must deploy a web client with a remote desktop session that the victim can access. HACKING HACKING
1.6.25 Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites Since November 2024, Mandiant Threat Defense has been investigating an UNC6032 campaign that weaponizes the interest around AI tools, in particular those tools which can be used to generate videos based on user prompts. HACKING HACKING
20.5.25 Shadow Roles Shadow Roles: AWS Defaults Can Open the Door to Service Takeover HACKING CLOUD
4.5.24 AirBorne Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk HACKING Apple
29.4.25 UyghurEdit++ Tool Uyghur Language Software Hijacked to Deliver Malware HACKING SOFTWARE
15.4.25 Double-Edged Email Attack Pick your Poison - A Double-Edged Email Attack HACKING SPAM
4.4.25 ClickFix tactic From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic HACKING CRYPTOCURRENCY
2.4.25 CPU_HU: Fileless cryptominer CPU_HU: Fileless cryptominer targeting exposed PostgreSQL with over 1.5K victims HACKING CRYPTOCURRENCY

1.4.25

Earth Alux

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques

HACKING

CyberSpionage

29.3.25

Browser-in-the-Browser (BitB) phishing technique

A browser-in-the-browser (BitB) attack is a new phishing technique that simulates a login window with a spoofed domain within a parent browser window to steal credentials.

HACKING

PHISHING

27.3.25

UI/UX changes Over 150K websites hit by full-page hijack linking to Chinese gambling sites HACKING INJECT

20.3.25

Auto Dealership Supply Chain Attack Over 100 auto dealerships were being abused compliments of a supply chain attack of a shared video service unique to dealerships. HACKING MALWARE
10.3.25 Polymorphic Extensions Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension HACKING HACKING
27.2.25 360XSS 360XSS: Mass Website Exploitation via Virtual Tour Framework for SEO Poisoning HACKING EXPLOIT
22.2.25 Deceptive Employment Scheme A network from North Korea linked to the fraudulent IT worker scheme that was involved in the creation of personal documentation for fictitious job applicants, such as resumés, online job profiles and cover letters, as well as come up convincing responses to explain unusual behaviors like avoiding video calls, accessing corporate systems from unauthorized countries or working irregular hours. Some of the bogus job applications were then shared on LinkedIn. HACKING AI
22.2.25 Sponsored Discontent A network likely of Chinese origin that was involved in the creation of social media content in English and long-form articles in Spanish that were critical of the United States, and subsequently published by Latin American news websites in Peru, Mexico, and Ecuador. HACKING AI
22.2.25 Romance-baiting Scam A network of accounts that was involved in the translation and generation of comments in Japanese, Chinese, and English for posting on social media platforms including Facebook, X and Instagram in connection with suspected Cambodia-origin romance and investment scams. HACKING AI
22.2.25 Iranian Influence Nexus A network of five accounts that was involved in the generation of X posts and articles that were pro-Palestinian, pro-Hamas, and pro-Iran, and anti-Israel and anti-U.S., and shared on websites associated with an Iranian influence operations tracked as the International Union of Virtual Media (IUVM) and Storm-2035. HACKING AI
22.2.25 Kimsuky and BlueNoroff A network of accounts operated by North Korean threat actors that was involved in gathering information related to cyber intrusion tools and cryptocurrency-related topics, and debugging code for Remote Desktop Protocol (RDP) brute-force attacks HACKING AI
22.2.25 Youth Initiative Covert Influence Operation A network of accounts that was involved in the creation of English-language articles for a website named "Empowering Ghana" and social media comments targeting the Ghana presidential election HACKING AI
22.2.25 Task Scam A network of accounts likely originating from Cambodia that was involved in the translation of comments between Urdu and English as part of a scam that lures unsuspecting people into jobs performing simple tasks (e.g., liking videos or writing reviews) in exchange for earning a non-existent commission, accessing which requires victims to part with their own money. HACKING AI
5.2.25 CVE-2025-0411 CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks HACKING VULNEREBILITY

18.1.25

Planet WGS-804HPT Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch HACKING Hardware

14.1.25

Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection Recently, we released an article where a credit card skimmer was targeting checkout pages on a Magento site. Now we’ve come across sophisticated credit card skimmer malware while investigating a compromised WordPress website. HACKING HACKING
21.12.24 cShell DDoS Bot Attack ASEC recently identified a new DDoS malware strain targeting Linux servers while monitoring numerous external attacks. The threat actor initially targeted poorly managed SSH services and ultimately installed a DDoS bot named cShell. cShell is developed in the Go language and is characterized by exploiting Linux tools called screen and hping3 to perform DDoS attacks. HACKING HACKING
11.12.24 Windows UI Automation Teaching an Old Framework New Tricks: The Dangers of Windows UI Automation HACKING HACKING

28.11.24

Dozens of Machines Infected

Dozens of Machines Infected: Year-Long NPM Supply Chain Attack Combines Crypto Mining and Data Theft

HACKING

HACKING

20.11.24

Ghost Tap

Ghost Tap: New cash-out tactic with NFC Relay

HACKING

NFC

5.9.24

MacropackThreat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloadsHACKINGMalware

5.9.24

Revival HijackRevival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at riskHACKINGHACKING

30.8.24

Malicious npm PackagesNorth Korea Still Attacking Developers via npmHACKINGMalware

21.8.24

pwish Be careful what you pwish for – Phishing in PWA applicationsHACKINGPHISHING

15.8.24

ArtiPACKEDArtiPACKED: Hacking Giants Through a Race Condition in GitHub Actions ArtifactsHACKINGHACKING

9.8.24

Downgrade AttacksWindows Downdate: Downgrade Attacks Using Windows UpdatesHACKINGAttack

9.7.24

Jenkins Script ConsoleTurning Jenkins Into a Cryptomining Machine From an Attacker's PerspectiveHACKINGCRYPTOCURRENCY
14.6.24Sleepy Pickle Part 2Exploiting ML models with pickle file attacks: Part 2HACKINGML
14.6.24Sleepy Pickle Part 1Exploiting ML models with pickle file attacks: Part 1HACKINGML

5.6.24

Excel File Deploys

FortiGuard Labs has recently identified a sophisticated cyberattack involving an Excel file embedded with a VBA macro designed to deploy a DLL file.

HACKING

HACKING

3.6.24

Cox modems hack

Hacking Millions of Modems (and Investigating Who Hacked My Modem)

HACKING

Hardware

1.6.24

Pumpkin Eclipse

Lumen Technologies’ Black Lotus Labs identified a destructive event, as over 600,000 small office/home office (SOHO) routers were taken offline belonging to a single internet service provider (ISP).

HACKING

Hardware

28.5.24

DNSBombDNSBomb is a new practical and powerful pulsing DoS attack exploiting DNS queries and responses. HackingDNS

28.5.24

Server Side Credit Card Skimmer Lodged in Obscure PluginAttackers are always finding new ways to inject malware into websites and new ways to obscure it to avoid detection, but they’re always up to their same old tricks. In this post, we’ll explore how attackers are using a very obscure PHP snippet WordPress plugin to install server-side malware to harvest credit card details from a WooCommerce online store. HackingHacking

27.5.24

HTML SmugglingHTML smuggling is an innovative attack technique, which abuses HTML5 and JavaScript features to inject or extract data across network boundaries. HackingHTML

27.5.24

Transparent Phishing and HTML SmugglingPhishing with Cloudflare Workers: Transparent Phishing and HTML SmugglingHackingPhishing

10.5.24

TunnelcrackTunnelCrack is a combination of two widespread security vulnerabilities in VPNs. An adversary can abuse these vulnerabilities to leak traffic outside the VPN tunnel. HackingVPN

10.5.24

TunnelVisionA local network VPN leaking technique that affects all routing-based VPNsHackingVPN

11.4.24

Trick Developers Detected in an Open Source Supply Chain Attack

In a recent attack campaign, cybercriminals were discovered cleverly manipulating GitHub's search functionality, and using meticulously crafted repositories to distribute malware.

Hacking

Hacking

22.3.24z0Minerz0Miner Exploits Korean Web Servers to Attack WebLogic ServerHackingExploit
7.3.24QuishingQR codes have had a great run in the past few years, diffusing into almost every aspect of our lives, from looking at restaurant menus and paying for products or services online and offline to accessing websites with greater ease. While the positives of QR codes are clearly visible, both from a business and user perspective, their usage has some pitfalls. HackingMobil

18.1.24

iShutdown A lightweight method to detect potential iOS malware HackingiOS
3.1.24 SMTP Smuggling In the course of a research project in collaboration with the SEC Consult Vulnerability Lab, Timo Longin (@timolongin) - known for his DNS protocol attacks HackingSPAM

1.1.24

Hijack Execution Flow: DLL Search Order Hijacking Adversaries may execute their own malicious payloads by hijacking the search order used to load DLLs. Windows systems use a common method to look for required DLLs to load into a program.Hijacking DLL loads may be for the purpose of establishing persistence as well as elevating privileges and/or evading restrictions on file execution. HackingDLL

26.12.23

RTF template injection Injection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption Beyond APT Actors  HackingPhishing

24.12.23

Insta-Phish-A-Gram Following Trustwave SpiderLabs’ blog on social media-themed phishing on Facebook, comes another flavor of ‘infringement’ phishing. In this case, the targets, still under the umbrella of Meta, are Instagram users HackingPhishing

9.12.23

5GHOUL 5Ghoul : Unleashing Chaos on 5G Edge Devices Hacking5G

8.12.23

Ongoing attacks Star Blizzard increases sophistication and evasion in ongoing attacks HackingPhishing

6.12.23

Fake Lockdown Mode Fake Lockdown Mode: A post-exploitation tampering technique HackingApple

28.11.23

PERFORM NTLM FORCED AUTHENTICATION ATTACKS ABUSING MICROSOFT ACCESS “LINKED TABLE” FEATURE TO PERFORM NTLM FORCED AUTHENTICATION ATTACKS HackingHacking
6.11.23 Agonizing Serpens The attacks are characterized by attempts to steal sensitive data, such as personally identifiable information (PII) and intellectual property. HackingHacking
2.11.23 Kopeechka How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime HackingTool

3.10.23

Authenticated Origin Pulls (mTLS) When visitors request content from your domain, Cloudflare first attempts to serve content from the cache. If this attempt fails, Cloudflare sends a request — or an origin pull — back to your origin web server to get the content. HackingHacking

3.10.23

Silent Skimmer Silent Skimmer: Online Payment Scraping Campaign Shifts Targets From APAC to NALA HackingHacking

1.10.23

ZeroFont phishing technique

ZeroFont phishing technique

Hacking

Phishing

14.9.23

Repo Jacking

Repo Jacking: Exploiting the Dependency Supply Chain

Hacking

Hacking

24.7.23

drIBAN Uncovering drIBAN fraud operations. Chapter 3: Exploring the drIBAN web inject kit HackingHacking
4.7.23 HTML Smuggling HTML Smuggling: The Hidden Threat in Your InboxHackingHacking

1.7.23

ProxyjackingProxyjacking: The Latest Cybercriminal Side HustleHackingHacking
28.6.23Process MockingjayProcess Mockingjay: Echoing RWX In Userland To Achieve Code ExecutionHackingHacking