Cyber Attack

How does the Advent of New Technologies Impact Information Security?How does the Advent of New Technologies Impact Information Security?

How does the Advent of New Technologies Impact Information Security?

The ever-evolving digital age affects information security more than most folks understand. The rate of cybercrimes has increased exponentially and…

4 years ago
Hackers Launching large-Scale phishing-as-a-service Operation with 300,000 newly created Phishing Domains – MicrosoftHackers Launching large-Scale phishing-as-a-service Operation with 300,000 newly created Phishing Domains – Microsoft

Hackers Launching large-Scale phishing-as-a-service Operation with 300,000 newly created Phishing Domains – Microsoft

Large-scale well-organized phishing as a service (PhaaS) operation is uncovered recently by Microsoft. This platform helps users to customize campaigns…

4 years ago
Earth Baku APT Hackers Group Upgraded Its Hacking Toolset for New CyberespionageEarth Baku APT Hackers Group Upgraded Its Hacking Toolset for New Cyberespionage

Earth Baku APT Hackers Group Upgraded Its Hacking Toolset for New Cyberespionage

The cybersecurity researchers of Trend Micro have recently detected a campaign that has been initiated by the APT threat actor…

4 years ago
Key Recommendation to Avoid Pitfalls in Cybersecurity Wargaming DesignKey Recommendation to Avoid Pitfalls in Cybersecurity Wargaming Design

Key Recommendation to Avoid Pitfalls in Cybersecurity Wargaming Design

Wargaming has long been used by the military for research and training purposes. Given the growing complexity, sophistication, severity, and…

4 years ago
IndigoZebra APT Group Uses Dropbox Service to Target Government EntitiesIndigoZebra APT Group Uses Dropbox Service to Target Government Entities

IndigoZebra APT Group Uses Dropbox Service to Target Government Entities

During a routine investigation, the security analyst of Check Point research has identified a spear-phishing campaign. According to the experts,…

4 years ago
ToxicEye RAT Uses Telegram to Steal Data from Victims and Perform Malicious ActivitiesToxicEye RAT Uses Telegram to Steal Data from Victims and Perform Malicious Activities

ToxicEye RAT Uses Telegram to Steal Data from Victims and Perform Malicious Activities

Cybersecurity researchers have recently detected several attacks that are generally using a remote access virus through Telegram communications to steal…

4 years ago
Chinese Hackers Attacking Telecommunications Industry to Steal 5G SecretsChinese Hackers Attacking Telecommunications Industry to Steal 5G Secrets

Chinese Hackers Attacking Telecommunications Industry to Steal 5G Secrets

The threat actors from China are now targeting the telecommunications organizations of Southeast Asia, Germany, Europe, the United States, India,…

4 years ago
Russian Hackers Exploited Lithuanian Infrastructure to Launch Cyber-attacksRussian Hackers Exploited Lithuanian Infrastructure to Launch Cyber-attacks

Russian Hackers Exploited Lithuanian Infrastructure to Launch Cyber-attacks

Russia-linked APT groups leveraged the Lithuanian nation’s technology infrastructure to launch cyber-attacks against targets worldwide. A report by Lithuania’s intelligence…

4 years ago
Connections Between Four of 2020’s Biggest Ransomware Strains FoundConnections Between Four of 2020’s Biggest Ransomware Strains Found

Connections Between Four of 2020’s Biggest Ransomware Strains Found

Chainalysis is a blockchain analysis company. They provide data, software, services, and research to government agencies, exchanges, financial institutions, and…

4 years ago
SolarWinds CEO Blames Intern for ‘solarwinds123’ Password Leak that Led to Biggest Cyber Attack in 2020SolarWinds CEO Blames Intern for ‘solarwinds123’ Password Leak that Led to Biggest Cyber Attack in 2020

SolarWinds CEO Blames Intern for ‘solarwinds123’ Password Leak that Led to Biggest Cyber Attack in 2020

“solarwinds123”, the password that is believed to be the root cause of the biggest cyber hack of 2020. Top executives…

4 years ago