Cyber Attack

How to Analyze the MITRE Engenuity ATT&CK® Evaluations: Enterprise

Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…

11 months ago

INTERPOL Uncovers 1,300+ Servers Used as Launchpads For Cyber Attacks

A recent massive operation by INTERPOL, which happens to be the biggest international police organization in the world, has successfully…

11 months ago

ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks

A new large-scale campaign named "ApateWeb '' has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted…

11 months ago

Hackers Use SYSTEMBC Tool to Maintain Access to Compromised Network

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…

12 months ago

Parrot TDS Injecting Malicious Redirect Scripts on Hacked Sites

In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…

12 months ago

Google Chrome Browser Zero-Day Vulnerability Exploited in Wild – Emergency Patch!

Google Chrome has released its stable channel update version 20.0.6099.234 for Mac, 120.0.6099.224 for Linux, and 120.0.6099.224/225 for Windows. However,…

12 months ago

Hackers Abuse GitHub to Host Malicious Infrastructure

GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution…

12 months ago

Mastermind Hacker Behind $2 Million Crypto Scam Arrested

The 29-year-old man was arrested in Mykolaiv, Ukraine, for using hacked accounts to create 1 million virtual servers to illegally mine…

12 months ago

Hackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary Commands

Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…

1 year ago

Mirai-Based NoaBot Launches a DDoS Attack on Linux Devices

Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things…

1 year ago