Friday, March 7, 2025

Cyber Attack

SocGholish Attacks Enterprises Via Fake Browser Updates

Enterprises are being targeted by the malware known as SocGholish through deceptive browser update prompts.This malware, notorious for its stealth and the complexity...

F5’s Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely

In a significant cybersecurity development, researchers have uncovered critical vulnerabilities in F5's Next Central Manager, which could potentially allow attackers to gain full administrative...

Polish Government Under Sophisticated Cyber Attack From APT28 Hacker Group

The Polish computer emergency response team CERT.pl has issued a warning about an ongoing cyberattack campaign by the notorious APT28 hacking group, also known...

UK Ministry of Defence System Hacked by Chinese Hackers

Chinese state-sponsored hackers are highly sophisticated, leveraging advanced techniques and vast resources to conduct cyber espionage and steal sensitive data from Western governments, militaries,...

New TunnelVision Attack Lets Attackers Snoop on VPN Traffic

In a groundbreaking discovery, cybersecurity experts at Leviathan Security Group have unveiled a new type of cyberattack dubbed "TunnelVision," which poses a threat to...

Hackers Use Custom Backdoor & Powershell Scripts to Attack Windows Machines

The Damselfly Advanced Persistent Threat (APT) group, also known as APT42, has been actively utilizing custom backdoor variants, NiceCurl and TameCat, to infiltrate Windows...

VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

While facilitating remote work, remote desktop software presents security challenges for IT teams due to the use of various tools and ports.The multitude...

Russian Hackers Actively Attacking Small-scale Infrastructure Sectors

Russian hacktivists increasingly target small-scale operational technology (OT) systems across North America and Europe.These attacks, primarily focused on the Water and Wastewater Systems (WWS),...