Cyber Attack

Okta Support System Hacked, Users Sensitive Data ExposedOkta Support System Hacked, Users Sensitive Data Exposed

Okta Support System Hacked, Users Sensitive Data Exposed

The US-based software firm Okta has discovered malicious activity using a stolen credential to access Okta's support case management system.…

1 year ago
Adobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively ExploitedAdobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively Exploited

Adobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively Exploited

The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are…

1 year ago
Stayin’ Alive Hacking Teleco & Government Organizations to Deploy BackdoorStayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor

Stayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor

Threat actors target telecoms and government ministries because they house valuable data and infrastructure.  Telecoms hold sensitive communication records and…

1 year ago
Mirai-based DDoS Attackers Aggressively Adopted New Router ExploitsMirai-based DDoS Attackers Aggressively Adopted New Router Exploits

Mirai-based DDoS Attackers Aggressively Adopted New Router Exploits

In September 2023, FortiGuard Labs' vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign.  This campaign, known…

1 year ago
Chinese Android-based Devices It Comes Pre-installed With a Firmware BackdoorChinese Android-based Devices It Comes Pre-installed With a Firmware Backdoor

Chinese Android-based Devices It Comes Pre-installed With a Firmware Backdoor

The Trojan War's famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes…

1 year ago
Massive Surge in Cyber Attacks Targeting Real Estate and Utilities OrganizationsMassive Surge in Cyber Attacks Targeting Real Estate and Utilities Organizations

Massive Surge in Cyber Attacks Targeting Real Estate and Utilities Organizations

Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics.  They leverage advanced technologies, use…

1 year ago
Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary CodeZip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code

Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code

A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious…

2 years ago
Hackers Bypass Cloudflare Firewall and DDoS Protections using CloudflareHackers Bypass Cloudflare Firewall and DDoS Protections using Cloudflare

Hackers Bypass Cloudflare Firewall and DDoS Protections using Cloudflare

Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers…

2 years ago
Lu0Bot Node.js Malware Takes Complete Control Over Victim’s ComputerLu0Bot Node.js Malware Takes Complete Control Over Victim’s Computer

Lu0Bot Node.js Malware Takes Complete Control Over Victim’s Computer

Through strategies like polymorphic code, which continuously alters its appearance to prevent detection, as well as employing encryption and obfuscation…

2 years ago
EvilBamboo Attacking Android & iOS Devices With Custom MalwareEvilBamboo Attacking Android & iOS Devices With Custom Malware

EvilBamboo Attacking Android & iOS Devices With Custom Malware

EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat…

2 years ago