Cyber Attack

CISA Warns of Emotet Malware Attacks Targeting Government Entities Via Weaponized Word Documents

CISA observes a significant increase in Emotet malware attacks that steals login credentials from various browsers, email clients, and applications.…

4 years ago

A New Mirai based IoT RAT Spreading Through 2 0-day Vulnerabilities

Netlab observed a new IoT botnet exploits two Tenda router 0-day vulnerabilities to install a Remote Access Trojan (RAT). The…

4 years ago

New Ransomware that Threatens Companies to Pay Ransom Within 3 days Else they Leak Data

The threat actor group behind new ransomware dubbed "Egregor" targets companies to steal sensitive data and then encrypt all the…

4 years ago

SilentFade – A Malware Family that Used Facebook ad Platform to Attack Users

Every malware needs a medium to spread the infection, SilentFade malware abuses the Facebook ads platform to attack users for…

4 years ago

How to Become a Certified Cyber Threat Intelligent Analyst?

Nowadays, Cyber crimes are increasing. The demand for cyber thteat intelligence experts is high. The field of cyber Intelligence is…

4 years ago

CISA warns that Chinese Hackers Using Open-source Exploitation Tools to Target U.S. Agencies

CISA warns that Chinese nation-state actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to…

4 years ago

Former Uber CISO Joseph Sullivan Charged for Helping Hackers for 2016 UBER Hack

Recently, the former security chief of Uber, Joseph Sullivan, was Charged for helping hackers for the 2016 UBER hack. He…

4 years ago

Reddit Massive Hack – Multiple Subreddits Compromised Posting pro-Trump Messages

Reddit suffered a massive hack, multiple subreddits have been defaced during the last 24 hours, and the attackers posted messages…

4 years ago

Chinese APT Group Attacks India and Hong Kong With New Variant of MgBot Malware & Android RAT

Chinese state-sponsored hacking group targets India and Hong Kong with a unique phishing attack designed to convince the target. The…

4 years ago

These are the Top 5 Publicly Available Hacking Tools Mostly used By Hackers

Cyber Criminals are using various malicious tools for cyber-attacks based on the target's strength to infiltrate the sensitive data and…

4 years ago