Cyber Attack
Massive Surge in Cyber Attacks Targeting Real Estate and Utilities Organizations
Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics. They leverage advanced technologies, use social engineering techniques, and collaborate...
AWS
MadPot: AWS Honeypot to Disrupt Threat Actors
In the realm of cybersecurity, the battle against threat actors never stops. With its vast cloud infrastructure, Amazon Web Services (AWS) is at the...
Cyber Security News
North Korean and Chinese Hackers Attacking Healthcare Industries
Healthcare has been one of the primary industries targeted by threat actors as part of every malware or ransomware campaign. Many Advanced Persistent Threat...
Cyber Security News
Threat Actors Actively Using Remote Management Tools to Deploy Ransomware
The threat actors have been spotted increasingly depending on Remote Management and Monitoring (RMM) tools, which resulted in a relatively botched Hive ransomware distribution. The original payload...
Cyber Security News
Fortinet FortiOS Flaw Let Attacker Execute Malicious JavaScript Code
Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which threat actors can use for malicious purposes.These vulnerabilities...
Cyber Security News
Pro-Russian Actors Initiated A DDoS Attack Against Canadian Organizations
The Canadian government, banking, and transportation industries have recently been the targets of many distributed denial of service (DDoS) attacks.This criminal activity is linked...
Cyber Security News
3AM Ransomware Attack – Stop Services & Delete Shadow Copies Before Encrypting
Ransomware is a universal threat to enterprises, targeting anyone handling sensitive data when profit potential is high.A new ransomware named 3AM has surfaced and...
Cyber Security News
Microsoft Teams as a Tool for Storm-0324 Threat Group to Hack Corporate Networks
According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations.However, as of July...