Cyber Attack

Adobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively Exploited

The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are…

1 year ago

Stayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor

Threat actors target telecoms and government ministries because they house valuable data and infrastructure.  Telecoms hold sensitive communication records and…

1 year ago

Mirai-based DDoS Attackers Aggressively Adopted New Router Exploits

In September 2023, FortiGuard Labs' vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign.  This campaign, known…

1 year ago

Chinese Android-based Devices It Comes Pre-installed With a Firmware Backdoor

The Trojan War's famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes…

1 year ago

Massive Surge in Cyber Attacks Targeting Real Estate and Utilities Organizations

Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics.  They leverage advanced technologies, use…

1 year ago

Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code

A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious…

1 year ago

Hackers Bypass Cloudflare Firewall and DDoS Protections using Cloudflare

Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers…

1 year ago

Lu0Bot Node.js Malware Takes Complete Control Over Victim’s Computer

Through strategies like polymorphic code, which continuously alters its appearance to prevent detection, as well as employing encryption and obfuscation…

1 year ago

EvilBamboo Attacking Android & iOS Devices With Custom Malware

EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat…

1 year ago

Gold Melody Attacking Organizations With Burp Extension, Mimikatz, and Other Tools

The financially motivated GOLD MELODY threat group has been active at least since 2017, attacking organizations by taking advantage of…

1 year ago