Cyber Attack

Black Basta Ransomware Gang Infiltrates Networks Using Penetration Testing Tools

The distribution of QAKBOT malware is resurrected once again by operators of the Black Basta ransomware group on September 8,…

2 years ago

Student Jailed for Hacking into Email & Snapchat Accounts of Female Classmates

As part of the criminal case against a former student of the University of Puerto Rico (UPR), a judge in…

2 years ago

RedEye – CISA Developed Open-source Red Team Tool Monitoring C&C Server Activities

A new open-source analytical tool dubbed RedEye designed to make it easier for operators to visualize and report activities associated…

2 years ago

Android Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is Enabled

The installation of a VPN on your Android phone is supposed to ensure that all outgoing traffic is protected. This…

2 years ago

Russian Hacker Launch DDoS Attacks Against Major Airports Websites

The Distributed Denial of Service (DDoS) attacks, hit 14 major US airport websites. The websites were temporarily shut down due…

2 years ago

Over 400 Malicious Android & iOS Apps Stealing Facebook Passwords

In a recent press release from Meta Platforms, it was announced that over 400 malicious apps had been identified on…

2 years ago

New Malware Compromised Hundreds of Microsoft SQL Servers

There has been a discovery of a new type of malware by security researchers named, Maggie, which targets Microsoft SQL…

2 years ago

WireShark 4.0.0 Released – What’s New!!

There are several open-source packet analyzers available, but Wireshark is among the most popular. Moreover, the application has been upgraded…

2 years ago

Beware!! New Go-based Malware Attack Windows & Linux Systems For DDoS

The cybersecurity researchers at Lumen's Black Lotus Labs asserted that in order to mine crypto-currencies and launch DDoS attacks, hackers…

2 years ago

RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely

CISA's bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the…

2 years ago