Cyber Attack

Akira Ransomware Actively Exploiting Cisco Anyconnect VulnerabilityAkira Ransomware Actively Exploiting Cisco Anyconnect Vulnerability

Akira Ransomware Actively Exploiting Cisco Anyconnect Vulnerability

Threat actors exploit Cisco AnyConnect vulnerabilities to gain unauthorized access to networks, compromise sensitive information, and potentially execute malicious activities. …

1 year ago
Turla APT’c New Tool Designed to Steal Login CredentialsTurla APT’c New Tool Designed to Steal Login Credentials

Turla APT’c New Tool Designed to Steal Login Credentials

The Russian cyber espionage threat group "Turla APT group" was discovered to be using a new backdoor for its malicious…

1 year ago
How to Analyze the MITRE Engenuity ATT&CK® Evaluations: EnterpriseHow to Analyze the MITRE Engenuity ATT&CK® Evaluations: Enterprise

How to Analyze the MITRE Engenuity ATT&CK® Evaluations: Enterprise

Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…

1 year ago
INTERPOL Uncovers 1,300+ Servers Used as Launchpads For Cyber AttacksINTERPOL Uncovers 1,300+ Servers Used as Launchpads For Cyber Attacks

INTERPOL Uncovers 1,300+ Servers Used as Launchpads For Cyber Attacks

A recent massive operation by INTERPOL, which happens to be the biggest international police organization in the world, has successfully…

1 year ago
ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber AttacksApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks

ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks

A new large-scale campaign named "ApateWeb '' has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted…

1 year ago
Hackers Use SYSTEMBC Tool to Maintain Access to Compromised NetworkHackers Use SYSTEMBC Tool to Maintain Access to Compromised Network

Hackers Use SYSTEMBC Tool to Maintain Access to Compromised Network

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…

1 year ago
Parrot TDS Injecting Malicious Redirect Scripts on Hacked SitesParrot TDS Injecting Malicious Redirect Scripts on Hacked Sites

Parrot TDS Injecting Malicious Redirect Scripts on Hacked Sites

In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…

1 year ago
Google Chrome Browser Zero-Day Vulnerability Exploited in Wild – Emergency Patch!Google Chrome Browser Zero-Day Vulnerability Exploited in Wild – Emergency Patch!

Google Chrome Browser Zero-Day Vulnerability Exploited in Wild – Emergency Patch!

Google Chrome has released its stable channel update version 20.0.6099.234 for Mac, 120.0.6099.224 for Linux, and 120.0.6099.224/225 for Windows. However,…

1 year ago
Hackers Abuse GitHub to Host Malicious InfrastructureHackers Abuse GitHub to Host Malicious Infrastructure

Hackers Abuse GitHub to Host Malicious Infrastructure

GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution…

1 year ago
Mastermind Hacker Behind $2 Million Crypto Scam ArrestedMastermind Hacker Behind $2 Million Crypto Scam Arrested

Mastermind Hacker Behind $2 Million Crypto Scam Arrested

The 29-year-old man was arrested in Mykolaiv, Ukraine, for using hacked accounts to create 1 million virtual servers to illegally mine…

1 year ago