Robuta

Sponsor of the Day: Jerkmate
https://thecybersecurity.news/general-cyber-security-news/cisa-reports-prc-hackers-using-brickstorm-for-long-term-access-in-u-s-systems-35122/ CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems | The Cyber Security... The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put to use by... long term accesshackers usingcyber securitycisareports https://thehackernews.com/2023/04/hackers-using-self-extracting-archives.html Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks Researchers uncover a new attack technique involving malicious SFX files! These files can hide hidden functionality, enabling persistent backdoor. hackers usingself extractingstealthy backdoorarchivesexploit https://www.computerweekly.com/news/366641986/Chinese-hackers-using-compromised-networks-to-spy-on-Western-companies-says-Five-Eyes Chinese hackers using compromised networks to spy on Western companies, says Five Eyes | Computer... Companies urged to take countermeasures as Chinese hacking groups use networks of infected home and office devices ‘at scale’ to evade security monitoring... chinese hackerscompanies saysfive eyesusingcompromised https://thehackernews.com/2022/12/ransomware-hackers-using-new-way-to.html Ransomware Hackers Using New Way to Bypass MS Exchange ProxyNotShell Mitigations Ransomware attackers are utilizing a new exploit called "OWASSRF" to bypass Microsoft hackers usingnew wayms exchangeransomwarebypass https://thehackernews.com/2023/06/chinese-hackers-using-never-before-seen.html Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks New cyber espionage threat! Chinese group Volt Typhoon, aka Bronze Silhouette, employs advanced techniques to infiltrate and maintain access. chinese hackerscritical infrastructureusingneverseen https://hbh.sh/news/752/hackers-using-stolen-bank-information-to-trick-victims-into-downloading-bitrat-malware Hackers Using Stolen Bank Information to Trick Victims into Downloading BitRAT Malware - Tech News... Phishing / Social Engineering / Trojan RAT hackers usingbank informationtech newsstolentrick https://www.itpro.com/technology/cryptocurrencies/359242/hackboss-malware-is-using-telegram-to-steal-cryptocurrency-from HackBoss malware is using Telegram to steal cryptocurrency from other hackers | IT Pro Apr 16, 2021 - Hackers stealing from wannabe hackers using fake software using telegrammalwarestealcryptocurrencyhackers https://www.proofpoint-total-protection.com/blog/sharepoint-hacking-using-copilot/ Sharepoint Hacking: How Hackers Are Using Copilot to Grab Your Passwords Jan 20, 2026 - Discover the hidden risks of Microsoft 365 Copilot and AI chatbots, from prompt injections to Shadow AI. Learn how to protect your business. using copilotsharepointhackinghackersgrab https://www.theinsaneapp.com/2022/12/north-korean-hackers-stealing-nfts-using-around-500-phishing-domains.html North Korean Hackers Stealing NFTs Using Around 500 Phishing Domains Apr 19, 2025 - According to reports, hackers linked to North Korea's Lazarus Group are behind a huge phishing campaign that targeted NFT investors north korean hackersphishing domainsstealingnftsusing https://null-byte.wonderhowto.com/how-to/lora-range-test/ How Hackers Can Control Anything Remotely Using LoRa Modules :: Null Byte LoRa (long-range) technology is widely used in IoT applications because it can transmit data over long distances without requiring internet access. Because... using loranull bytehackerscontrolanything https://thehackernews.com/2025/08/researchers-warn-crossc2-expands-cobalt.html Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS CrossC2-enabled attacks from Sept–Dec 2024 target Linux, overlap with ransomware, bypass EDR for stealth. cobalt strikehackersfoundusingexpand https://hackread.com/fancy-bear-hackers-graphite-malware-powerpoint/ Fancy Bear Hackers Distributing Graphite Malware using PowerPoint Files Oct 9, 2023 - APT28 or Fancy Bear is linked with the Russian military intelligence unit called GRU. fancy bearpowerpoint fileshackersdistributinggraphite https://news.sky.com/story/hackers-could-have-stolen-beer-from-brewdog-using-bug-that-exposed-details-of-200-000-shareholders-12428929 Hackers could have stolen beer from BrewDog using bug that exposed details of 200,000 shareholders... Oct 8, 2021 - Vulnerabilities in the mobile app for the Scottish brewery and pub chain were in place for 18 months before being fixed, according to security researchers. hackers could200 000stolenbeerbrewdog