Cyber Attack

12 Norway Government Ministries were Targeted in a Cyberattack12 Norway Government Ministries were Targeted in a Cyberattack

12 Norway Government Ministries were Targeted in a Cyberattack

According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks. The most recent attack was aimed…

2 years ago
North Korean Hacker Group Breached US IT Firm JumpCloudNorth Korean Hacker Group Breached US IT Firm JumpCloud

North Korean Hacker Group Breached US IT Firm JumpCloud

The cloud-based IT management firm JumpCloud was compromised by North Korean Lazarus Group hackers who appear to be financially motivated…

2 years ago
Sophisticated DDoS Attacks Have Evolved Rapidly; Targeting IT ServicesSophisticated DDoS Attacks Have Evolved Rapidly; Targeting IT Services

Sophisticated DDoS Attacks Have Evolved Rapidly; Targeting IT Services

Sophisticated DDoS attacks have become a favored tool for hackers, enabling them to target not only large organizations but also…

2 years ago
FIN8 Revamped Hacking Toolkit with New Stealthy Attack FeaturesFIN8 Revamped Hacking Toolkit with New Stealthy Attack Features

FIN8 Revamped Hacking Toolkit with New Stealthy Attack Features

Syssphinx (aka FIN8) is a financially motivated cyber-crime group deploying revamped sardonic backdoor to deliver Noberus ransomware. This group has been…

2 years ago
JumpCloud Hacked – Attackers Compromised The Systems Via Spear-phishing AttackJumpCloud Hacked – Attackers Compromised The Systems Via Spear-phishing Attack

JumpCloud Hacked – Attackers Compromised The Systems Via Spear-phishing Attack

JumpCloud, an American commercial software company, has announced a data breach attributed to a spear phishing attack launched by a…

2 years ago
Lazarus APT Group Hijack Windows IIS Servers to Distribute MalwareLazarus APT Group Hijack Windows IIS Servers to Distribute Malware

Lazarus APT Group Hijack Windows IIS Servers to Distribute Malware

Threat actors always search for vulnerable devices and networks to gain illicit access and perform malicious activities to accomplish their…

2 years ago
Red Menshen APT Group Deploying BPFDoor in Linux KernelRed Menshen APT Group Deploying BPFDoor in Linux Kernel

Red Menshen APT Group Deploying BPFDoor in Linux Kernel

APTs Red Menshen expands targets to Linux and cloud servers, as seen in ransomware attacks on VMware ESXi, Mirai botnet…

2 years ago
Jenkins Plugin Flaw Lets Attackers Gain Admin AccessJenkins Plugin Flaw Lets Attackers Gain Admin Access

Jenkins Plugin Flaw Lets Attackers Gain Admin Access

A recent security advisory from Jenkins reported that they had fixed 24 vulnerabilities affecting multiple Jenkins plugins. This Flaw includes…

2 years ago
How To Respond Cyber Incident In your OrganizationHow To Respond Cyber Incident In your Organization

How To Respond Cyber Incident In your Organization

An incident response plan is very essential for any organization to respond to an incident as quickly as possible. Here…

2 years ago
Hackers Exploit Netwrix Auditor RCE Flaw in Truebot Malware AttackHackers Exploit Netwrix Auditor RCE Flaw in Truebot Malware Attack

Hackers Exploit Netwrix Auditor RCE Flaw in Truebot Malware Attack

A newly found Truebot Malware targets both US and Canada-based organizations to exfiltrate sensitive information by exploiting vulnerabilities in the…

2 years ago