Cyber Attack

Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary CodeZip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code

Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code

A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious…

2 years ago
Hackers Bypass Cloudflare Firewall and DDoS Protections using CloudflareHackers Bypass Cloudflare Firewall and DDoS Protections using Cloudflare

Hackers Bypass Cloudflare Firewall and DDoS Protections using Cloudflare

Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers…

2 years ago
Lu0Bot Node.js Malware Takes Complete Control Over Victim’s ComputerLu0Bot Node.js Malware Takes Complete Control Over Victim’s Computer

Lu0Bot Node.js Malware Takes Complete Control Over Victim’s Computer

Through strategies like polymorphic code, which continuously alters its appearance to prevent detection, as well as employing encryption and obfuscation…

2 years ago
EvilBamboo Attacking Android & iOS Devices With Custom MalwareEvilBamboo Attacking Android & iOS Devices With Custom Malware

EvilBamboo Attacking Android & iOS Devices With Custom Malware

EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat…

2 years ago
Gold Melody Attacking Organizations With Burp Extension, Mimikatz, and Other ToolsGold Melody Attacking Organizations With Burp Extension, Mimikatz, and Other Tools

Gold Melody Attacking Organizations With Burp Extension, Mimikatz, and Other Tools

The financially motivated GOLD MELODY threat group has been active at least since 2017, attacking organizations by taking advantage of…

2 years ago
Fortinet FortiOS Flaw Let Attacker Execute Malicious JavaScript CodeFortinet FortiOS Flaw Let Attacker Execute Malicious JavaScript Code

Fortinet FortiOS Flaw Let Attacker Execute Malicious JavaScript Code

Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which threat actors can use…

2 years ago
AMBERSQUID: Novel Cryptojacking Attack Leverages AWS ServicesAMBERSQUID: Novel Cryptojacking Attack Leverages AWS Services

AMBERSQUID: Novel Cryptojacking Attack Leverages AWS Services

Cryptojacking is a malicious cyberattack in which an attacker stealthily utilizes a victim's computer or device to mine cryptocurrencies such…

2 years ago
Hackers Attack Facebook Business Users Aggressively to Steal Login CredentialsHackers Attack Facebook Business Users Aggressively to Steal Login Credentials

Hackers Attack Facebook Business Users Aggressively to Steal Login Credentials

A new and highly concerning cyber threat has emerged, as a botnet known as "MrTonyScam" has been orchestrating an extensive…

2 years ago
Researchers Uncover Phishing Empire Attacking 56,000+ Microsoft 365 AccountsResearchers Uncover Phishing Empire Attacking 56,000+ Microsoft 365 Accounts

Researchers Uncover Phishing Empire Attacking 56,000+ Microsoft 365 Accounts

Recent reports indicate that a new threat actor named “W3LL” has been discovered running a large phishing empire completely hidden…

2 years ago
North Korean Hackers Use 0-Day Exploits to Attack Security ResearchersNorth Korean Hackers Use 0-Day Exploits to Attack Security Researchers

North Korean Hackers Use 0-Day Exploits to Attack Security Researchers

Google's Threat Analysis Group (TAG) has issued an update regarding an ongoing campaign by North Korean threat actors targeting security…

2 years ago