Cyber Attack

<strong>Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments</strong><strong>Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments</strong>

Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

Threat actors have managed to get their hands on two shady applications that were uploaded to the app stores managed…

2 years ago
<strong>New DDoS-as-a-Service Platform Attacking Medical Institutions</strong><strong>New DDoS-as-a-Service Platform Attacking Medical Institutions</strong>

New DDoS-as-a-Service Platform Attacking Medical Institutions

Passion Group, a Killnet, and Anonymous Russia affiliate, recently started providing DDoS-as-a-Service to pro-Russian hackers.  During the attacks on January…

2 years ago
<strong>Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware</strong><strong>Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware</strong>

Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

The cybersecurity analysts at Check Point Research recently reported that TrickGate, a shellcode-based packer, has been in operation for over…

2 years ago
<strong>New Prilex Malware Blocks Contactless Payments to Steal Credit Card Data</strong><strong>New Prilex Malware Blocks Contactless Payments to Steal Credit Card Data</strong>

New Prilex Malware Blocks Contactless Payments to Steal Credit Card Data

Prilex is indeed a single threat actor that transformed from malware targeted at ATMs into distinctive modular point-of-sale (PoS) malware. Prilex…

2 years ago
<strong>GitHub Breach – Hackers Stole Code Signing Certificates From Repositories</strong><strong>GitHub Breach – Hackers Stole Code Signing Certificates From Repositories</strong>

GitHub Breach – Hackers Stole Code Signing Certificates From Repositories

GitHub announced that it suffered a security breach in which unauthorized individuals obtained access to specific development and release planning…

2 years ago
Facebook & Instagram Flaw Let Anyone Bypass Two-factor AuthenticationFacebook & Instagram Flaw Let Anyone Bypass Two-factor Authentication

Facebook & Instagram Flaw Let Anyone Bypass Two-factor Authentication

The lack of rate-limiting in Instagram was discovered by Gtm Mänôz, a security researcher from Kathmandu, Nepal.  This flaw could…

2 years ago
FBI Hacks Back Hive Ransomware Gang’s Infrastructure – Website SeizedFBI Hacks Back Hive Ransomware Gang’s Infrastructure – Website Seized

FBI Hacks Back Hive Ransomware Gang’s Infrastructure – Website Seized

As a result of an international law enforcement operation, the sites utilized by the Hive ransomware operation for both payments…

2 years ago
<strong>Hackers Actively Exploiting Critical ManageEngine Vulnerability</strong><strong>Hackers Actively Exploiting Critical ManageEngine Vulnerability</strong>

Hackers Actively Exploiting Critical ManageEngine Vulnerability

Rapid7 is taking action in response to several instances of compromise caused by the exploitation of CVE-2022-47966, which is a…

2 years ago
Hackers Compromised CircleCI Employee’s Laptop to Breach the Company’s SystemsHackers Compromised CircleCI Employee’s Laptop to Breach the Company’s Systems

Hackers Compromised CircleCI Employee’s Laptop to Breach the Company’s Systems

CircleCI, a DevOps platform, discovered that malware installed on a CircleCI engineer's laptop was used by an unauthorized third party…

2 years ago
Blind Eagle Hacker Group Launching Indiscriminate Attacks Using Powerful ToolsetBlind Eagle Hacker Group Launching Indiscriminate Attacks Using Powerful Toolset

Blind Eagle Hacker Group Launching Indiscriminate Attacks Using Powerful Toolset

There have been reports that an organized threat actor, known as Blind Eagle (tracked as APT-C-36), has re-appeared again with…

2 years ago