Hackers use weaponized LNK files to exploit vulnerabilities in Windows operating systems. These files often contain malicious code that can be executed when the user clicks on the shortcut.

These weaponized files allow threat actors to perform several types of malicious activities like:-

Gain unauthorized access Deliver malware Deliver malicious payload

Recently, cybersecurity researchers at ASEC identified that the Kimsuky group has been actively using the weaponized LNK file to deploy AppleSeed malware.…

Read More

The ransomware group Akira has declared responsibility for the recent cyberattack on the systems of Nissan in Australia and New Zealand. The hackers claim to have exfiltrated over 100 GB of documents from the automaker.

Now, the malefactors are threatening to release confidential business and client data online, as negotiations with Nissan regarding a ransom have been unsuccessful—either due to the company’s refusal to engage with the hackers or its unwillingness to pay the demanded sum.…

Read More

For the latest discoveries in cyber research for the week of 27th November, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES Nevada-based medical transcription company, Perry Johnson & Associates (PJ&A), has disclosed a data breach that affected more than 9M patients at multiple healthcare providers in the US.…

Read More