Cyber Attack

US Federal Agency Hacked By Exploiting Telerik Vulnerability in IIS ServerUS Federal Agency Hacked By Exploiting Telerik Vulnerability in IIS Server

US Federal Agency Hacked By Exploiting Telerik Vulnerability in IIS Server

As a result of a joint effort of the CISA, FBI, and MS-ISAC, a public advisory was published recently. This…

2 years ago
<strong>New CASPER Attack Steals Data from Air-gapped Computers Using Internal Speakers</strong><strong>New CASPER Attack Steals Data from Air-gapped Computers Using Internal Speakers</strong>

New CASPER Attack Steals Data from Air-gapped Computers Using Internal Speakers

Researchers from the Korea University School of Cyber Security, Seoul, have recently presented a new covert channel attack known as…

2 years ago
New Version of Xenomorph Android Malware Attacks 400 Banks CustomersNew Version of Xenomorph Android Malware Attacks 400 Banks Customers

New Version of Xenomorph Android Malware Attacks 400 Banks Customers

As per the latest findings of ThreatFabric, a version of the Android banking trojan with the name Xenomorph has been…

2 years ago
<strong>Record Breaking DDoS Attack – 158.2 Million Packets Per Second</strong><strong>Record Breaking DDoS Attack – 158.2 Million Packets Per Second</strong>

Record Breaking DDoS Attack – 158.2 Million Packets Per Second

When a DDoS attack is conducted, the server being targeted receives a large number of garbage requests. As a result,…

2 years ago
U.S. House and Senate members Data Hacked, Offered for SaleU.S. House and Senate members Data Hacked, Offered for Sale

U.S. House and Senate members Data Hacked, Offered for Sale

The breach of a Washington, DC, health insurance marketplace may have allowed hackers’ access to members of the House and…

2 years ago
<strong>PoC Exploit Released For Critical Microsoft Word RCE Bug</strong><strong>PoC Exploit Released For Critical Microsoft Word RCE Bug</strong>

PoC Exploit Released For Critical Microsoft Word RCE Bug

There has been a proof-of-concept published recently for CVE-2023-21716 that analyzes this vulnerability. This vulnerability has been marked as "Critical"…

2 years ago
<strong>BlackLotus UEFI Bootkit – First Known Malware to Bypass Secure Boot Defenses</strong><strong>BlackLotus UEFI Bootkit – First Known Malware to Bypass Secure Boot Defenses</strong>

BlackLotus UEFI Bootkit – First Known Malware to Bypass Secure Boot Defenses

The cybersecurity analysts at ESET recently reported that BlackLotus, a sneaky bootkit for UEFI (Unified Extensible Firmware Interface), has gained…

2 years ago
U.S. Marshals Service Hacked – Sensitive Information LeakedU.S. Marshals Service Hacked – Sensitive Information Leaked

U.S. Marshals Service Hacked – Sensitive Information Leaked

The theft of critical law enforcement data is currently under investigation by the U.S. Marshals Service (USMS), triggered by a…

2 years ago
<strong>Hacker Claim Telecom Provider Data Including Source Code, Employee Data Stolen</strong><strong>Hacker Claim Telecom Provider Data Including Source Code, Employee Data Stolen</strong>

Hacker Claim Telecom Provider Data Including Source Code, Employee Data Stolen

Telus, a Canadian national telecommunications company is looking into whether employees' data as well as the source code for the system were…

2 years ago
<strong>Media Gaint News Corp Says Hackers Had Access to Network for Two Years</strong><strong>Media Gaint News Corp Says Hackers Had Access to Network for Two Years</strong>

Media Gaint News Corp Says Hackers Had Access to Network for Two Years

On January 20, 2022, News Corp identified cyberattacks on a business email and document storage system utilized by numerous News Corp…

2 years ago