Cyber Attack

Cleveland City Closes Offices Following Attack on IT Systems

Cleveland City Hall and Erieview offices will remain closed for a second consecutive day, June 11, as officials continue investigating a significant “cyber event” that has disrupted city operations. A…

10 months ago

Hackers Weaponizing MSC Files In Targeted Attack Campaign

Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that…

10 months ago

Sticky Werewolf Weaponizing LNK Files Group Attacking To Attack Organizations

Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to malicious…

10 months ago

Muhstik Malware Attacking Apache RocketMQ To Execute Remote Code

Apache RocketMQ platform is a widely used messaging system that handles high volumes of data and critical operations, often attracting…

10 months ago

Hacktivist Groups Attacking Industrial Control Systems To Disrupt Services

Hacktivist groups are increasingly targeting critical infrastructure's Operational Technology (OT) systems, motivated by geopolitical issues that, unlike traditional website defacements,…

10 months ago

UNC1151 Hackers Weaponizing Excel Documents To Attack Windows Machine

Mandiant identified a UNC1151 information campaign targeting Ukraine, Lithuania, Latvia, and Poland with disinformation, as CRIL linked a recent malicious…

10 months ago

Fog Ransomware Attacking Windows Servers Administrators To Steal RDP Logins

A new ransomware variant dubbed ‘Fog’ has been spotted targeting US businesses in the education and recreation sectors. Forensic data…

10 months ago

Threat Actors Weaponize Excel Files To Attack Windows Machines

Attackers are using malicious Excel files with VBA macros to deploy DLLs and ultimately install Cobalt Strike on compromised Windows…

10 months ago

CarnavalHeist Weaponizing Word Documents To Steal Login Credentials

Hackers take advantage of Word documents as weapons due to their widespread use and trust. This is facilitated by the…

10 months ago

LilacSquid Hackers Attacking IT Industries To Harvest Confidential Data

Hackers target IT industries as they hold valuable data, possess critical infrastructure, and often have access to sensitive information from…

11 months ago