Cyber Attack

Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code

A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious…

1 year ago

Hackers Bypass Cloudflare Firewall and DDoS Protections using Cloudflare

Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers…

1 year ago

Lu0Bot Node.js Malware Takes Complete Control Over Victim’s Computer

Through strategies like polymorphic code, which continuously alters its appearance to prevent detection, as well as employing encryption and obfuscation…

1 year ago

EvilBamboo Attacking Android & iOS Devices With Custom Malware

EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat…

1 year ago

Gold Melody Attacking Organizations With Burp Extension, Mimikatz, and Other Tools

The financially motivated GOLD MELODY threat group has been active at least since 2017, attacking organizations by taking advantage of…

1 year ago

Fortinet FortiOS Flaw Let Attacker Execute Malicious JavaScript Code

Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which threat actors can use…

1 year ago

AMBERSQUID: Novel Cryptojacking Attack Leverages AWS Services

Cryptojacking is a malicious cyberattack in which an attacker stealthily utilizes a victim's computer or device to mine cryptocurrencies such…

1 year ago

Hackers Attack Facebook Business Users Aggressively to Steal Login Credentials

A new and highly concerning cyber threat has emerged, as a botnet known as "MrTonyScam" has been orchestrating an extensive…

1 year ago

Researchers Uncover Phishing Empire Attacking 56,000+ Microsoft 365 Accounts

Recent reports indicate that a new threat actor named “W3LL” has been discovered running a large phishing empire completely hidden…

1 year ago

North Korean Hackers Use 0-Day Exploits to Attack Security Researchers

Google's Threat Analysis Group (TAG) has issued an update regarding an ongoing campaign by North Korean threat actors targeting security…

1 year ago