Cyber Attack

CoralRaider Hackers Steals Login Credentials, Financial Data & Social Media LoginsCoralRaider Hackers Steals Login Credentials, Financial Data & Social Media Logins

CoralRaider Hackers Steals Login Credentials, Financial Data & Social Media Logins

A new threat actor dubbed "CoralRaider" targets victims' financial information, login credentials, and social media profiles—including accounts for businesses and…

12 months ago
Winnti Hackers’ New UNAPIMON Tool Hijacks DLL And Unhook API CallsWinnti Hackers’ New UNAPIMON Tool Hijacks DLL And Unhook API Calls

Winnti Hackers’ New UNAPIMON Tool Hijacks DLL And Unhook API Calls

Hackers commonly employ dynamic-link library (DLL) hijacking and unhooking of APIs to damage security measures and authorize harmful activities on…

12 months ago
Microsoft’s Exchange Server Hack: Key Rotation Flaw Triggers BreachMicrosoft’s Exchange Server Hack: Key Rotation Flaw Triggers Breach

Microsoft’s Exchange Server Hack: Key Rotation Flaw Triggers Breach

Storm-0558, a cyberespionage group affiliated with the People's Republic of China, has reportedly compromised Microsoft Exchange mailboxes of 22 organizations…

1 year ago
5 Major Phishing Campaigns in March 20245 Major Phishing Campaigns in March 2024

5 Major Phishing Campaigns in March 2024

March saw many notable phishing attacks, with criminals using new tactics and approaches to target unsuspecting victims. It is time…

1 year ago
PandaBuy Data Breach: 1.3 Million Customers Data LeakedPandaBuy Data Breach: 1.3 Million Customers Data Leaked

PandaBuy Data Breach: 1.3 Million Customers Data Leaked

PandaBuy, a popular online shopping platform, has been the victim of a significant data breach. This breach has resulted in…

1 year ago
Imperva Web Application Firewall Flaw Let Attackers Bypass WAF RulesImperva Web Application Firewall Flaw Let Attackers Bypass WAF Rules

Imperva Web Application Firewall Flaw Let Attackers Bypass WAF Rules

Imperva SecureSphere WAF, a security tool for on-premise web applications, has a vulnerability in some versions that allows attackers to…

1 year ago
Hackers Using Microsoft OneNote Files to Orchestrate Cyber AttacksHackers Using Microsoft OneNote Files to Orchestrate Cyber Attacks

Hackers Using Microsoft OneNote Files to Orchestrate Cyber Attacks

Hackers have been found leveraging Microsoft OneNote files as a vector to compromise systems across various industries. The campaign, under…

1 year ago
DinodasRAT Linux Malware Attack on Linux Servers to Gain Backdoor AccessDinodasRAT Linux Malware Attack on Linux Servers to Gain Backdoor Access

DinodasRAT Linux Malware Attack on Linux Servers to Gain Backdoor Access

DinodasRAT, also known as XDealer, is a sophisticated C++ backdoor targeting multiple operating systems. It is designed to enable attackers…

1 year ago
Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy SectorsBeware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government entities and energy companies.  The attackers,…

1 year ago
Chinese Hackers Attacking Southeast Asian Nations With Malware PackagesChinese Hackers Attacking Southeast Asian Nations With Malware Packages

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two Chinese Advanced Persistent Threat (APT) groups…

1 year ago