Cyber Attack
Cleveland City Closes Offices Following Attack on IT Systems
Cleveland City Hall and Erieview offices will remain closed for a second consecutive day, June 11, as officials continue investigating a significant “cyber event” that has disrupted city operations.A recent tweet from the...
Cyber Attack
Hackers Weaponizing MSC Files In Targeted Attack Campaign
Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that enable them to perform...
Cyber Attack
Sticky Werewolf Weaponizing LNK Files Group Attacking To Attack Organizations
Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to malicious files to using archive...
CVE/vulnerability
Muhstik Malware Attacking Apache RocketMQ To Execute Remote Code
Apache RocketMQ platform is a widely used messaging system that handles high volumes of data and critical operations, often attracting hackers. Exploiting the vulnerabilities in...
CVE/vulnerability
Hacktivist Groups Attacking Industrial Control Systems To Disrupt Services
Hacktivist groups are increasingly targeting critical infrastructure's Operational Technology (OT) systems, motivated by geopolitical issues that, unlike traditional website defacements, can disrupt essential services...
Cyber Attack
UNC1151 Hackers Weaponizing Excel Documents To Attack Windows Machine
Mandiant identified a UNC1151 information campaign targeting Ukraine, Lithuania, Latvia, and Poland with disinformation, as CRIL linked a recent malicious XLS campaign to UNC1151. The...
Cyber Attack
Fog Ransomware Attacking Windows Servers Administrators To Steal RDP Logins
A new ransomware variant dubbed ‘Fog’ has been spotted targeting US businesses in the education and recreation sectors.Forensic data revealed that threat actors accessed...
CVE/vulnerability
Threat Actors Weaponize Excel Files To Attack Windows Machines
Attackers are using malicious Excel files with VBA macros to deploy DLLs and ultimately install Cobalt Strike on compromised Windows machines, which use obfuscation...