Cyber Attack

U.S. Senator Blasts Microsoft for Chinese Hack Seeks Federal Action

A joint alert from the FBI and CISA concerning a hacking campaign that targeted Microsoft customers, including government entities, was released on July…

1 year ago

Pentagon Looks Into ‘Critical Compromise’ of Air Force and FBI Contacts

The communications systems of 17 Air Force stations were concerned about "critical compromise" after $90,000 in federal radio technology had…

1 year ago

Akira Ransomware Expands to Linux with In-built Tor Website

According to recent sources, threat actors have been working on a new variant of cross-platform ransomware that is named “Akira”.…

1 year ago

Critical MikroTik RouterOS Flaw Exposes 900,000 Systems to Cyber Attacks

MikroTik RouterOS were vulnerable to a privilege escalation vulnerability which was first disclosed in June 2022 at REcon. The vulnerability…

1 year ago

12 Norway Government Ministries were Targeted in a Cyberattack

According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks. The most recent attack was aimed…

1 year ago

North Korean Hacker Group Breached US IT Firm JumpCloud

The cloud-based IT management firm JumpCloud was compromised by North Korean Lazarus Group hackers who appear to be financially motivated…

1 year ago

Sophisticated DDoS Attacks Have Evolved Rapidly; Targeting IT Services

Sophisticated DDoS attacks have become a favored tool for hackers, enabling them to target not only large organizations but also…

1 year ago

FIN8 Revamped Hacking Toolkit with New Stealthy Attack Features

Syssphinx (aka FIN8) is a financially motivated cyber-crime group deploying revamped sardonic backdoor to deliver Noberus ransomware. This group has been…

1 year ago

JumpCloud Hacked – Attackers Compromised The Systems Via Spear-phishing Attack

JumpCloud, an American commercial software company, has announced a data breach attributed to a spear phishing attack launched by a…

1 year ago

Lazarus APT Group Hijack Windows IIS Servers to Distribute Malware

Threat actors always search for vulnerable devices and networks to gain illicit access and perform malicious activities to accomplish their…

1 year ago