Cyber Attack

Red Menshen APT Group Deploying BPFDoor in Linux KernelRed Menshen APT Group Deploying BPFDoor in Linux Kernel

Red Menshen APT Group Deploying BPFDoor in Linux Kernel

APTs Red Menshen expands targets to Linux and cloud servers, as seen in ransomware attacks on VMware ESXi, Mirai botnet…

2 years ago
Jenkins Plugin Flaw Lets Attackers Gain Admin AccessJenkins Plugin Flaw Lets Attackers Gain Admin Access

Jenkins Plugin Flaw Lets Attackers Gain Admin Access

A recent security advisory from Jenkins reported that they had fixed 24 vulnerabilities affecting multiple Jenkins plugins. This Flaw includes…

2 years ago
How To Respond Cyber Incident In your OrganizationHow To Respond Cyber Incident In your Organization

How To Respond Cyber Incident In your Organization

An incident response plan is very essential for any organization to respond to an incident as quickly as possible. Here…

2 years ago
Hackers Exploit Netwrix Auditor RCE Flaw in Truebot Malware AttackHackers Exploit Netwrix Auditor RCE Flaw in Truebot Malware Attack

Hackers Exploit Netwrix Auditor RCE Flaw in Truebot Malware Attack

A newly found Truebot Malware targets both US and Canada-based organizations to exfiltrate sensitive information by exploiting vulnerabilities in the…

2 years ago
Submarine Cable Growing Popularity Intensifying Cyber AttacksSubmarine Cable Growing Popularity Intensifying Cyber Attacks

Submarine Cable Growing Popularity Intensifying Cyber Attacks

Submarine cables installed on the ocean floor facilitate the transmission of data and voice between land-based stations. International communication has…

2 years ago
GuLoader Malware is Attacking Law Firms Using Weaponized PDF FileGuLoader Malware is Attacking Law Firms Using Weaponized PDF File

GuLoader Malware is Attacking Law Firms Using Weaponized PDF File

The cybersecurity researchers at Morphisec Labs have been tracking the GuLoader campaign since April of this year and found that…

2 years ago
Hackers Compromised the Russian Defense Satellite Communications ProviderHackers Compromised the Russian Defense Satellite Communications Provider

Hackers Compromised the Russian Defense Satellite Communications Provider

According to a report from the Telegram channel, Dozor, a Russian telecommunications company that offers services to power grids, oil…

2 years ago
Charming Kitten APT Group Uses Innovative Spear-phishing MethodsCharming Kitten APT Group Uses Innovative Spear-phishing Methods

Charming Kitten APT Group Uses Innovative Spear-phishing Methods

Charming Kitten APT Group Uses Innovative Spear-phishing Methods. Volexity researchers recently noticed that threat actors are actively intensifying their efforts…

2 years ago
Honeywell Server Compromised by MOVEit HackersHoneywell Server Compromised by MOVEit Hackers

Honeywell Server Compromised by MOVEit Hackers

A flaw was discovered in Progress MOVEit Transfer, a popular third-party online transfer application. By exploiting the flaw, attackers compromised…

2 years ago
CISOs are More Concerned with Lawsuits, and API Security (Survey Report)CISOs are More Concerned with Lawsuits, and API Security (Survey Report)

CISOs are More Concerned with Lawsuits, and API Security (Survey Report)

Digital initiatives play a crucial role in business today; they bring new business opportunities, fostered creative partnerships, and deliver new…

2 years ago