Cyber Attack
Client-Side Exploitation: Poisoning WebDAV+URL+LNK to Deliver Malicious Payloads
WebDAV incidents simulate an offensive attack employing a WebDAV server to distribute malware to a client PC. Attackers store malicious payloads and attract users...
Cyber Attack
Alert! Brute-Force SSH Attacks Rampant in the Wild: New Study From 427 Million Failed SSH Login Attempts
A comprehensive four-year study of brute-force attacks against SSH servers has revealed an alarming increase in the frequency and sophistication of these cyber attacks...
Cyber Attack
Real-World Law Enforcement Hack of Hackers End-to-Encrypted Chat Messenger
Law enforcement authorities successfully penetrated EncroChat, an encrypted chat program that is frequently used by criminals, in a ground-breaking operation that has shocked the...
Cyber Attack
How to Use Cyber Threat Intelligence? 4 TI Categories to Learn SOC/DFIR Team
Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of Compromise (IOCs) and Tactics,...
Cloud
Ahoi Attacks – New Attack Breaking VMs With Malicious Interrupts
Ahoy, which is often associated with communicating to ships, has now been playfully adopted in pirate language.We coin 'Ahoi,' an anagram of 'Iago,'...
Cyber Attack
Targus Hacked: Attackers Gain Access to File Servers
Targus International, LLC and its affiliates fell victim to a sophisticated cyberattack.The company, an indirect subsidiary of B. Riley Financial, Inc., announced that...
Cyber Attack
Cyber Attack on Consulting Firm Exposes DOJ Data of 341,000 People
Greylock McKinnon Associates, a prominent consulting firm, has reported a cyber attack that exposed personal data belonging to 341,000 individuals, including sensitive information from...
Cyber Attack
D-Link RCE Vulnerability Exploited in Wild, Impacts 92,000 Devices
Cybercriminals have actively exploited a critical vulnerability in D-Link Network Attached Storage (NAS) devices globally.Identified as CVE-2024-3273, this remote code execution (RCE) flaw poses...