In recent months, a surge in the use of Windows Packet Divert (WinDivert) drivers has been observed, primarily to intercept and modify network traffic on Windows systems. These drivers, widely used in legitimate utilities to bypass internet restrictions, have become an attractive tool for cybercriminals. Over the past six months, over 2.4 million detections of…
WASHINGTON, March 5 (Reuters) – A U.S. congressional committee is warning Americans to replace Chinese-made wireless routers, including those manufactured by TP-Link, citing national security concerns. Lawmakers argue that these devices pose a cyber threat that could allow China to infiltrate U.S. critical infrastructure. The House Select Committee on the Chinese Communist Party has urged…
Cybercriminals continue to evolve their tactics, leveraging legitimate platforms to distribute malicious payloads. Microsoft Threat Intelligence has uncovered a large-scale malvertising campaign that infected nearly one million devices globally through deceptive ads embedded in illegal streaming websites. These ads redirected users through a multi-stage attack chain, ultimately leading to malicious repositories hosted on GitHub, Discord,…
The AI Revolution in Cybersecurity Artificial intelligence is transforming industries, and digital security is no exception. From automating threat detection to improving phishing scams, machine learning has become both a powerful tool for defense and a weapon for cybercriminals. But here’s the challenge: While these technologies make security systems more intelligent, attackers are also leveraging…
How China’s Cyber Mercenaries Are Reshaping Global Security In a major legal breakthrough, the U.S. Department of Justice (DOJ) and FBI have unsealed indictments against 12 Chinese nationals linked to a state-sponsored cyber espionage network. These individuals—including members of the notorious APT27 hacking group—are accused of hacking government agencies, corporations, and dissidents worldwide under the…
The term “hacker” often conjures images of cybercriminals exploiting vulnerabilities for malicious purposes. However, many individuals, known as ethical hackers, penetration testers, and security researchers, dedicate their skills to safeguarding systems by identifying and addressing vulnerabilities before they can be exploited by malicious actors. Yet, the realm of ethical hacking is fraught with complexities. Even…