Saturday, January 11, 2025

Cyber Attack

CarnavalHeist Weaponizing Word Documents To Steal Login Credentials

Hackers take advantage of Word documents as weapons due to their widespread use and trust.This is facilitated by the ease with which users...

LilacSquid Hackers Attacking IT Industries To Harvest Confidential Data

Hackers target IT industries as they hold valuable data, possess critical infrastructure, and often have access to sensitive information from various sectors. Compromising IT companies...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS) attacks are actively exploited by hackers. Sometimes, DDoS attacks are used...

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack

State-sponsored hackers recently exploited vulnerabilities in MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE).They used rogue virtual machines (VMs) to evade detection and maintain...

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program

In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing ZIP and RAR attachments to distribute SMOKELOADER malware.The most recent...

Chinese Hackers Stay Hidden On Military And Government Networks For Six Years

Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of critical infrastructure. This is mainly...

DNSBomb : A New DoS Attack That Exploits DNS Queries

A new practical and powerful Denial of service attack has been discovered that exploits DNS queries and responses.This new attack has been termed...

Ikaruz Red Team Leveraging LockBit Builder To Launch Ransomware Attacks

Hackers exploit ransomware as it enables them to extort money from victims by encrypting their data and demanding a ransom for its release. While this...