Sunday, April 6, 2025

Cyber Attack

VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

While facilitating remote work, remote desktop software presents security challenges for IT teams due to the use of various tools and ports.The multitude...

Russian Hackers Actively Attacking Small-scale Infrastructure Sectors

Russian hacktivists increasingly target small-scale operational technology (OT) systems across North America and Europe.These attacks, primarily focused on the Water and Wastewater Systems (WWS),...

Panda Restaurant Corporate Systems Hacked: Customer Data Exposed

Panda Restaurant Group, Inc., a leading name in the fast-food industry, has confirmed a significant breach in its corporate data systems.The incident, which...

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running. Containers are isolated software packages that are lightweight...

Kaiser Permanente Says 13.4 Million Users Impacted in Data Leak

Kaiser Permanente, one of the largest healthcare providers in the United States, was the victim of a cyber attack that compromised the personal information...

Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services

A large botnet-as-a-service network originating from China was discovered, which comprises numerous domains, over 20 active Telegram groups, and utilizes other domestic communication channels. The...

Okta Warns of Credential Stuffing Attacks Using Proxy Services

Okta has issued a warning about the increasing prevalence of credential-stuffing attacks.These attacks, which leverage stolen user credentials to gain unauthorized access to...

Fileless .NET Based Code Injection Attack Delivers AgentTesla Malware

A recent malware campaign used a VBA macro in a Word document to download and execute a 64-bit Rust binary. This binary employs fileless...