Cyber Attack

How to Use Cyber Threat Intelligence? 4 TI Categories to Learn SOC/DFIR Team

Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…

9 months ago

Ahoi Attacks – New Attack Breaking VMs With Malicious Interrupts

Ahoy, which is often associated with communicating to ships, has now been playfully adopted in pirate language. We coin 'Ahoi,'…

9 months ago

Targus Hacked: Attackers Gain Access to File Servers

Targus International, LLC and its affiliates fell victim to a sophisticated cyberattack. The company, an indirect subsidiary of B. Riley…

9 months ago

Cyber Attack on Consulting Firm Exposes DOJ Data of 341,000 People

Greylock McKinnon Associates, a prominent consulting firm, has reported a cyber attack that exposed personal data belonging to 341,000 individuals,…

9 months ago

D-Link RCE Vulnerability Exploited in Wild, Impacts 92,000 Devices

Cybercriminals have actively exploited a critical vulnerability in D-Link Network Attached Storage (NAS) devices globally. Identified as CVE-2024-3273, this remote…

9 months ago

Chinese Hackers Using AI Tools To Influence Upcoming Elections

By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation,…

9 months ago

Veterinary Giant IT System Attacked by Hackers

CVS Group, a leading veterinary service provider, has confirmed that it fell victim to a cyber-attack involving unauthorized access to…

9 months ago

Multiple Cisco Small Business Routers Vulnerable to XSS Attacks

Cisco has alerted its customers about a critical vulnerability affecting several Small Business RV Series Routers models. This vulnerability, CVE-2024-20362,…

9 months ago

CoralRaider Hackers Steals Login Credentials, Financial Data & Social Media Logins

A new threat actor dubbed "CoralRaider" targets victims' financial information, login credentials, and social media profiles—including accounts for businesses and…

9 months ago

Winnti Hackers’ New UNAPIMON Tool Hijacks DLL And Unhook API Calls

Hackers commonly employ dynamic-link library (DLL) hijacking and unhooking of APIs to damage security measures and authorize harmful activities on…

9 months ago