Cyber Attack

The UK and US Cybersecurity Agencies Said Cyclops Blink Malware Linked to Russian State Hackers

The UK and US cybersecurity agencies have recently linked a new malware called Cyclops Blink to the Russian state hacker…

3 years ago

FritzFrog Botnet Targeting SSH server, Data Center Servers, and Routers

FritzFrog botnet has been continuously targetting different systems for more than two years. The Cybersecurity researchers of Akamai security company…

3 years ago

A New Spyware Campaign Attack Industrial Enterprises To Steal Corporate Credentials

Several spyware campaigns have been discovered recently by the security researchers at Kaspersky Labs in which the industrial enterprises were…

3 years ago

Threat Actors Exploiting Log4j vulnerabilities propagated via SolarWinds Serv-U software

The cybersecurity researchers at Microsoft have recently identified a security flaw in SolarWinds Serv-U software that is exploited by the…

3 years ago

Prometheus Hacker Group Uses Traffic Direction System to Deliver Malware Binaries to Targets

The TDS (Traffic Direction System) of the Prometheus hacker group has been analyzed recently by the cybersecurity researcher of BlackBerry. …

3 years ago

How To Prevent Ransomware Attacks More Successfully?

Ransomware is one of the most common cyber threats that attack both companies and private users. It works by encrypting…

3 years ago

What is a Supply Chain Attack & How it Occurs?

When an organization adopts third-party or open-source code, it can unwittingly accept an extraordinary amount of risk originating upstream in…

3 years ago

Volvo Cars Servers Hacked – Attackers stolen Research and Development Information

The Swedish carmaker Volvo Cars has recently declared that some of their servers were hacked by unknown threat actors, and…

3 years ago

Beware of new Malicious Chrome Extension that Delivers Password Stealer Malware

Several malvertising campaigns have been discovered recently by the security experts of Cisco Talos. In these malvertising campaigns, it has…

3 years ago

How Does Penetration Testing Fit into Your Security Strategy?

In recent years, all kinds of organizations have faced cyber threats and attacks – from small cupcake businesses and blog…

3 years ago