JNEC.a Ransomware

Alert !! Hackers Launching New JNEC.a Ransomware via WinRAR Exploits – Do not Pay

A brand new JNEC.a ransomware spreading via recently discovered WinRAR vulnerability exploit to compromise windows computer & demand the ransom amount. This exploits leverage the recently discovered WinRAR ACE code injection vulnerability, since...
IMAP

Hackers Bypass Multi-factor Authentication to Hack Office 365 & G Suite Cloud Accounts Using...

attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks. Based on Proofpoint study, IMAP is the most abused protocol, IMAP is the protocol that...
DNS

What is DNS Attack and How Does it Work?

DNS Attack is a type of cyber attack that exploit the weakness or vulnerability in Domain name system. Today, the internet has turned into an integral part of our life. From communicating to banking to shopping to traveling, every...
Web Pages

Anonymous Hacker Group Destroyed 1 Million Web Pages that Owned by Coca-Cola, ToysRUs, McDonald’s

Anonymous Threat actor group compromised hundreds of websites and destroyed nearly 1 million Israeli based webpages that belong to some of the leading brands including Coca-Cola, ToysRUs, McDonald’s. This breach also affected some of...
DDoS service

DDoS-as-a Service Operator who Have Launched 1.3 Million DDoS Attacks Pleads Guilty in...

An Operator of DDoS-as-a Service (Illegal Booter Services) pleads guilty in North Carolina count for his massive operations of DDoS attack against 1.3 million targets. Sergiy P. Usatyuk, illegal DDoS service operator from...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended