Cyber Attack

Massive Cyber Attack Across the World Against ISPs & Data Centres: More than 200,000 Cisco Switches HackedMassive Cyber Attack Across the World Against ISPs & Data Centres: More than 200,000 Cisco Switches Hacked

Massive Cyber Attack Across the World Against ISPs & Data Centres: More than 200,000 Cisco Switches Hacked

Biggest Hackers Group Performing Massive Cyber attack against internet service providers, and data centers around the world by compromising Cisco switches. Hackers compromised…

2 years ago
Dark Pink APT Group Compromised 13 Organizations in 9 CountriesDark Pink APT Group Compromised 13 Organizations in 9 Countries

Dark Pink APT Group Compromised 13 Organizations in 9 Countries

Dark Pink has successfully targeted 13 organizations across 9 countries, highlighting the extent of their malicious activities.

2 years ago
New Bandit Malware Attacks Browsers to Steal Personal & Financial LoginsNew Bandit Malware Attacks Browsers to Steal Personal & Financial Logins

New Bandit Malware Attacks Browsers to Steal Personal & Financial Logins

Bandit malware prioritizes Windows as its target and leverages the legitimate command-line tool to execute programs under different user permissions.

2 years ago
Fully Encrypted GuLoader Uses Google Drive to Download PayloadsFully Encrypted GuLoader Uses Google Drive to Download Payloads

Fully Encrypted GuLoader Uses Google Drive to Download Payloads

Antivirus products continuously advance to combat evolving threats, prompting malware developers to create new bypassing techniques like "packing" and "crypting,"…

2 years ago
New Android Malware on Google Play Store with Over 50,000 InstallsNew Android Malware on Google Play Store with Over 50,000 Installs

New Android Malware on Google Play Store with Over 50,000 Installs

The cybersecurity researchers at ESET recently made a significant discovery, a previously unidentified remote access trojan (RAT) lurking within an…

2 years ago
Hackers Use Weaponized DOCX File to Deploy Stealthy MalwareHackers Use Weaponized DOCX File to Deploy Stealthy Malware

Hackers Use Weaponized DOCX File to Deploy Stealthy Malware

CERT-UA has identified and addressed a cyber attack on the government information systems of Ukrainian governmental state bodies. Through investigation,…

2 years ago
CISA Warns that Hackers Actively Exploiting Samsung VulnerabilityCISA Warns that Hackers Actively Exploiting Samsung Vulnerability

CISA Warns that Hackers Actively Exploiting Samsung Vulnerability

CISA has issued a recent warning regarding a security flaw that impacts Samsung devices, enabling attackers to circumvent Android's address…

2 years ago
Russian IT Guy Jailed for DDoSing Government WebsitesRussian IT Guy Jailed for DDoSing Government Websites

Russian IT Guy Jailed for DDoSing Government Websites

According to reports from the FSB (Federal Security Service) Department’s Press Service in Rostov Region, Yevgeny Kotikov, an IT specialist,…

2 years ago
Hackers Using AI Tools Like ChatGPT to Deploy MalwareHackers Using AI Tools Like ChatGPT to Deploy Malware

Hackers Using AI Tools Like ChatGPT to Deploy Malware

Malicious ad campaigns with themes connected to artificial intelligence (AI) tools like Midjourney and ChatGPT have been seen in Google's…

2 years ago
Hackers Modified Cobalt Strike Capabilities to Attack macOS UsersHackers Modified Cobalt Strike Capabilities to Attack macOS Users

Hackers Modified Cobalt Strike Capabilities to Attack macOS Users

Geacon, a Cobalt Strike implementation written in Golang, is likely to attract the attention of threat actors looking for vulnerable…

2 years ago