Sujatha

Sujatha

Phishing-as-a-Service Strox Lets Hackers Phish any Brand by Submitting its LogoPhishing-as-a-Service Strox Lets Hackers Phish any Brand by Submitting its Logo

Phishing-as-a-Service Strox Lets Hackers Phish any Brand by Submitting its Logo

The ever-evolving world of cybercrime has given birth to a disturbing phenomenon – Phishing-as-a-Service (PhaaS), and one name that sends…

2 years ago
Mirai-based DDoS Attackers Aggressively Adopted New Router ExploitsMirai-based DDoS Attackers Aggressively Adopted New Router Exploits

Mirai-based DDoS Attackers Aggressively Adopted New Router Exploits

In September 2023, FortiGuard Labs' vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign.  This campaign, known…

2 years ago
Video Surveillance Camera Flaw Allows Attackers to Change Passwords & AlarmsVideo Surveillance Camera Flaw Allows Attackers to Change Passwords & Alarms

Video Surveillance Camera Flaw Allows Attackers to Change Passwords & Alarms

Pablo Martínez, a member of the Red Team at cybersecurity firm Entelgy Innotec Security, has uncovered significant vulnerabilities in low-cost…

2 years ago
Top 10 Cybersecurity Misconfigurations for Red and Blue Team AssessmentsTop 10 Cybersecurity Misconfigurations for Red and Blue Team Assessments

Top 10 Cybersecurity Misconfigurations for Red and Blue Team Assessments

In a recent joint effort to bolster national cybersecurity, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security…

2 years ago
Microsoft Office XSS Flaw Let Attackers Execute Arbitrary CodeMicrosoft Office XSS Flaw Let Attackers Execute Arbitrary Code

Microsoft Office XSS Flaw Let Attackers Execute Arbitrary Code

A recently discovered vulnerability in Microsoft Office Word has raised concerns over the security of the popular productivity suite.  This…

2 years ago
Hackers Steal User’s Database From European Telecommunications Standards InstituteHackers Steal User’s Database From European Telecommunications Standards Institute

Hackers Steal User’s Database From European Telecommunications Standards Institute

The European Telecommunications Standards Institute (ETSI) has uncovered a data breach in which threat actors obtained a database holding a…

2 years ago
Top 8 Free & Paid Screen Recording Tools – 2023Top 8 Free & Paid Screen Recording Tools – 2023

Top 8 Free & Paid Screen Recording Tools – 2023

Screen recording is a powerful tool that allows users to capture digital activities happening on their computer screens. This technology…

2 years ago
Hackers Attack Facebook Business Users Aggressively to Steal Login CredentialsHackers Attack Facebook Business Users Aggressively to Steal Login Credentials

Hackers Attack Facebook Business Users Aggressively to Steal Login Credentials

A new and highly concerning cyber threat has emerged, as a botnet known as "MrTonyScam" has been orchestrating an extensive…

2 years ago
North Korean Hackers Use 0-Day Exploits to Attack Security ResearchersNorth Korean Hackers Use 0-Day Exploits to Attack Security Researchers

North Korean Hackers Use 0-Day Exploits to Attack Security Researchers

Google's Threat Analysis Group (TAG) has issued an update regarding an ongoing campaign by North Korean threat actors targeting security…

2 years ago
Hackers Use Weaponized LNK Files to Deploy RedEyes MalwareHackers Use Weaponized LNK Files to Deploy RedEyes Malware

Hackers Use Weaponized LNK Files to Deploy RedEyes Malware

AhnLab Security Emergency Response Center (ASEC) has issued a warning about a significant security threat involving the distribution of malicious…

2 years ago