Balaji

Balaji

<strong>A Military-Type Explosive Sent Via USB Drive to Detonate When Plug-in To Computer</strong><strong>A Military-Type Explosive Sent Via USB Drive to Detonate When Plug-in To Computer</strong>

A Military-Type Explosive Sent Via USB Drive to Detonate When Plug-in To Computer

The Ecuadorian free-to-air television network Ecuavisa recently reported that a USB device was detonated inside an organization's newsroom. The explosion…

2 years ago
Hackers Inject Weaponized JavaScript (JS) on 51,000 WebsitesHackers Inject Weaponized JavaScript (JS) on 51,000 Websites

Hackers Inject Weaponized JavaScript (JS) on 51,000 Websites

Researchers from Unit 42 have been monitoring a widespread campaign of harmful JavaScript (JS) injections. The campaign aims to redirect…

2 years ago
US Federal Agency Hacked By Exploiting Telerik Vulnerability in IIS ServerUS Federal Agency Hacked By Exploiting Telerik Vulnerability in IIS Server

US Federal Agency Hacked By Exploiting Telerik Vulnerability in IIS Server

As a result of a joint effort of the CISA, FBI, and MS-ISAC, a public advisory was published recently. This…

2 years ago
<strong>Record Breaking DDoS Attack – 158.2 Million Packets Per Second</strong><strong>Record Breaking DDoS Attack – 158.2 Million Packets Per Second</strong>

Record Breaking DDoS Attack – 158.2 Million Packets Per Second

When a DDoS attack is conducted, the server being targeted receives a large number of garbage requests. As a result,…

2 years ago
HiatusRAT Malware Attack Routers to Gain Remote Access & Download FilesHiatusRAT Malware Attack Routers to Gain Remote Access & Download Files

HiatusRAT Malware Attack Routers to Gain Remote Access & Download Files

Lumen's Black Lotus Labs recently witnessed that Hackers are currently targeting DrayTek Vigor router models 2960 and 3900 in a…

2 years ago
<strong>MQsTTang – Chinese Hackers Using Custom Malware To Evade AV Detection</strong><strong>MQsTTang – Chinese Hackers Using Custom Malware To Evade AV Detection</strong>

MQsTTang – Chinese Hackers Using Custom Malware To Evade AV Detection

In a recent analysis, MQsTTang, a newly designed custom backdoor, has been scrutinized by ESET researchers. After a thorough investigation,…

2 years ago
<strong>Underground Carding Marketplace BidenCash Leaked 2 Million Credit Cards</strong><strong>Underground Carding Marketplace BidenCash Leaked 2 Million Credit Cards</strong>

Underground Carding Marketplace BidenCash Leaked 2 Million Credit Cards

BidenCash, a new entrant in the underground carding business, has announced a 1-year anniversary promotion in which it is offering…

2 years ago
MyloBot Botnet Attacks Thousands of Windows Systems and Turns Them as ProxyMyloBot Botnet Attacks Thousands of Windows Systems and Turns Them as Proxy

MyloBot Botnet Attacks Thousands of Windows Systems and Turns Them as Proxy

BitSight recently detected MyloBot, an advanced botnet that has successfully infiltrated numerous computer systems, primarily situated in four countries:-  India…

2 years ago
<strong>HardBit Ransomware Steal Sensitive Data From Victims Before Encrypting</strong><strong>HardBit Ransomware Steal Sensitive Data From Victims Before Encrypting</strong>

HardBit Ransomware Steal Sensitive Data From Victims Before Encrypting

As of October 2022, The HardBit ransomware attack was first detected as a threat extorting cryptocurrency payments to decrypt data…

2 years ago