Cyber Attack

F5 Warns of Active Attacks Targeting BIG-IP SQL injection vulnerabilityF5 Warns of Active Attacks Targeting BIG-IP SQL injection vulnerability

F5 Warns of Active Attacks Targeting BIG-IP SQL injection vulnerability

F5 Networks has issued a security alert about a severe vulnerability in its BIG-IP Configuration utility, identified as CVE-2023-46748.  This…

2 years ago
Hackers Abuse Google Search Ads to Deploy Bonanza MalwareHackers Abuse Google Search Ads to Deploy Bonanza Malware

Hackers Abuse Google Search Ads to Deploy Bonanza Malware

Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking advantage…

2 years ago
Hackers Deliver Remcos RAT as Weaponized PDF Payslip DocumentHackers Deliver Remcos RAT as Weaponized PDF Payslip Document

Hackers Deliver Remcos RAT as Weaponized PDF Payslip Document

AhnLab Security Emergency Response Center (ASEC) has recently revealed a disturbing case of Remcos RAT, a malicious software that can…

2 years ago
Spain Arrests 34 Cybercriminals Who Stole Data of 4 Million PeopleSpain Arrests 34 Cybercriminals Who Stole Data of 4 Million People

Spain Arrests 34 Cybercriminals Who Stole Data of 4 Million People

Law enforcement officials have successfully apprehended a notorious criminal organization responsible for perpetrating computer scams and stealing sensitive data belonging…

2 years ago
Okta Support System Hacked, Users Sensitive Data ExposedOkta Support System Hacked, Users Sensitive Data Exposed

Okta Support System Hacked, Users Sensitive Data Exposed

The US-based software firm Okta has discovered malicious activity using a stolen credential to access Okta's support case management system.…

2 years ago
Adobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively ExploitedAdobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively Exploited

Adobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively Exploited

The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are…

2 years ago
Stayin’ Alive Hacking Teleco & Government Organizations to Deploy BackdoorStayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor

Stayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor

Threat actors target telecoms and government ministries because they house valuable data and infrastructure.  Telecoms hold sensitive communication records and…

2 years ago
Mirai-based DDoS Attackers Aggressively Adopted New Router ExploitsMirai-based DDoS Attackers Aggressively Adopted New Router Exploits

Mirai-based DDoS Attackers Aggressively Adopted New Router Exploits

In September 2023, FortiGuard Labs' vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign.  This campaign, known…

2 years ago
Chinese Android-based Devices It Comes Pre-installed With a Firmware BackdoorChinese Android-based Devices It Comes Pre-installed With a Firmware Backdoor

Chinese Android-based Devices It Comes Pre-installed With a Firmware Backdoor

The Trojan War's famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes…

2 years ago
Massive Surge in Cyber Attacks Targeting Real Estate and Utilities OrganizationsMassive Surge in Cyber Attacks Targeting Real Estate and Utilities Organizations

Massive Surge in Cyber Attacks Targeting Real Estate and Utilities Organizations

Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics.  They leverage advanced technologies, use…

2 years ago