Monday, January 13, 2025

Cyber Attack

Mirai-Based NoaBot Launches a DDoS Attack on Linux Devices

Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things (IoT) devices. Mirai's ability to...

10 Most Common Types of Cyber Attacks in 2023

Cyber attacks are evolving rapidly with advancements in technology, as threat actors exploit new vulnerabilities in:-SoftwareNetworks The rise of the following sophisticated techniques demonstrates a...

Ubisoft Investigates Cyber Attack: Possible Data Exfiltration by Hackers

Ubisoft, the renowned video game developer behind iconic franchises like Assassin's Creed and Far Cry, narrowly escaped a potentially devastating data breach. On December 20th,...

QakBot Malware Emerges with New Tactics, Attacking Hospitality Industry

QakBot (aka Qbot) primarily targets financial institutions since it is a sophisticated banking trojan and malware.This malware can facilitate more malicious acts, such as...

How Can DSPM Prevent High-Profile Breaches?

In early October 2023, a DNA testing company for ancestry discovery purposes, 23andMe, disclosed that it suffered a data breach.On the 5th of December...

Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts

Hackers target email accounts because they contain valuable personal and financial information. Successful email breaches enable threat actors to:-Identity theftFinancial fraudUnauthorized access to sensitive...

Hackers Deliver AsyncRAT Through Weaponized WSF Script Files

The AsyncRAT malware, which was previously distributed through files with the .chm extension, is now being disseminated via WSF script format. The WSF file was found...

Doppelgänger: Hackers Employ AI to Launch Highly sophistication Attacks

It has been observed that threat actors are using AI technology to conduct illicit operations on social media platforms.These malicious actors employ several...