Cyber Attack

Emergency Patch – 2 New Mozilla Firefox 0-Day Bugs Under Active AttackEmergency Patch – 2 New Mozilla Firefox 0-Day Bugs Under Active Attack

Emergency Patch – 2 New Mozilla Firefox 0-Day Bugs Under Active Attack

Mozilla has recently released new versions of Firefox to fix two new critical zero-day vulnerabilities that are actively exploited by…

3 years ago
Ransom DDoS Attack that Reached a Rate of 2.5 Million Requests per SecondRansom DDoS Attack that Reached a Rate of 2.5 Million Requests per Second

Ransom DDoS Attack that Reached a Rate of 2.5 Million Requests per Second

Imperva security firm recently claimed that it has managed to foil a massive ransom distributed denial-of-service (DDoS) cyberattack that peaked…

3 years ago
The UK and US Cybersecurity Agencies Said Cyclops Blink Malware Linked to Russian State HackersThe UK and US Cybersecurity Agencies Said Cyclops Blink Malware Linked to Russian State Hackers

The UK and US Cybersecurity Agencies Said Cyclops Blink Malware Linked to Russian State Hackers

The UK and US cybersecurity agencies have recently linked a new malware called Cyclops Blink to the Russian state hacker…

3 years ago
FritzFrog Botnet Targeting SSH server, Data Center Servers, and RoutersFritzFrog Botnet Targeting SSH server, Data Center Servers, and Routers

FritzFrog Botnet Targeting SSH server, Data Center Servers, and Routers

FritzFrog botnet has been continuously targetting different systems for more than two years. The Cybersecurity researchers of Akamai security company…

3 years ago
A New Spyware Campaign Attack Industrial Enterprises To Steal Corporate CredentialsA New Spyware Campaign Attack Industrial Enterprises To Steal Corporate Credentials

A New Spyware Campaign Attack Industrial Enterprises To Steal Corporate Credentials

Several spyware campaigns have been discovered recently by the security researchers at Kaspersky Labs in which the industrial enterprises were…

3 years ago
Threat Actors Exploiting Log4j vulnerabilities propagated via SolarWinds Serv-U softwareThreat Actors Exploiting Log4j vulnerabilities propagated via SolarWinds Serv-U software

Threat Actors Exploiting Log4j vulnerabilities propagated via SolarWinds Serv-U software

The cybersecurity researchers at Microsoft have recently identified a security flaw in SolarWinds Serv-U software that is exploited by the…

3 years ago
Prometheus Hacker Group Uses Traffic Direction System to Deliver Malware Binaries to TargetsPrometheus Hacker Group Uses Traffic Direction System to Deliver Malware Binaries to Targets

Prometheus Hacker Group Uses Traffic Direction System to Deliver Malware Binaries to Targets

The TDS (Traffic Direction System) of the Prometheus hacker group has been analyzed recently by the cybersecurity researcher of BlackBerry. …

3 years ago
How To Prevent Ransomware Attacks More Successfully?How To Prevent Ransomware Attacks More Successfully?

How To Prevent Ransomware Attacks More Successfully?

Ransomware is one of the most common cyber threats that attack both companies and private users. It works by encrypting…

3 years ago
What is a Supply Chain Attack & How it Occurs?What is a Supply Chain Attack & How it Occurs?

What is a Supply Chain Attack & How it Occurs?

When an organization adopts third-party or open-source code, it can unwittingly accept an extraordinary amount of risk originating upstream in…

3 years ago
Volvo Cars Servers Hacked – Attackers stolen Research and Development InformationVolvo Cars Servers Hacked – Attackers stolen Research and Development Information

Volvo Cars Servers Hacked – Attackers stolen Research and Development Information

The Swedish carmaker Volvo Cars has recently declared that some of their servers were hacked by unknown threat actors, and…

3 years ago