CVE/vulnerability
DNSBomb : A New DoS Attack That Exploits DNS Queries
A new practical and powerful Denial of service attack has been discovered that exploits DNS queries and responses.This new attack has been termed...
Cyber Attack
Ikaruz Red Team Leveraging LockBit Builder To Launch Ransomware Attacks
Hackers exploit ransomware as it enables them to extort money from victims by encrypting their data and demanding a ransom for its release. While this...
Cyber Attack
Turla Hackers Leveraging Microsoft Build Engine To Deliver Malware Stealthily
Hackers exploit the Microsoft Build Engine because it can execute code and build applications. This engine provides an easy means for them to send harmful...
Cloud
Cloud-Based Malware Attack Abusing Google Drive & Dropbox
A phishing email with a malicious zip attachment initiates the attack. The zip contains a single executable disguised as an Excel file using Left-To-Right...
Cyber Attack
DoppelGänger Attack: Malware Routed Via News Websites And Social Media
A Russian influence campaign, DoppelGänger, leverages fake news websites (typosquatted and independent) to spread disinformation, undermining support for Ukraine.Structura and SDA are running...
Artificial Intelligence
SWARM – Switchable Backdoor Attack Against Pre-trained Models
In the big data era, pre-training large vision transformer (ViT) models on massive datasets has become prevalent for enhanced performance on downstream tasks. Visual prompting...
CVE/vulnerability
Akira Ransomware Escalates Privilege To Exfiltrate Domain Controller Files
In a recent encounter, the Akira ransomware group exploited a novel privilege escalation technique, where the attackers infiltrated the victim's virtual environment to steal...
Cyber Attack
Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks
A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS) based VPN solutions, like...