Cyber Attack

Turla APT’c New Tool Designed to Steal Login Credentials

The Russian cyber espionage threat group "Turla APT group" was discovered to be using a new backdoor for its malicious…

11 months ago

Ukrainian Hacker Pleads Guilty for Leading Zeus & IcedID Malware Attacks

Vyacheslav Igorevich Penchukov, a 37-year-old resident of Donetsk, Ukraine, has pleaded guilty to his key role in developing and deploying…

11 months ago

How to Analyze the MITRE Engenuity ATT&CK® Evaluations: Enterprise

Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…

11 months ago

ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks

A new large-scale campaign named "ApateWeb '' has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted…

11 months ago

Pawn Storm APT Launch Hash Relay Attacks on Government Departments

In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on…

11 months ago

Hackers Use SYSTEMBC Tool to Maintain Access to Compromised Network

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…

12 months ago

SEC X Account was Hacked Using SIM Swapping Method

In a brazen act of digital deception, the U.S. Securities and Exchange Commission's (SEC) official Twitter account, @SECGov, was compromised…

12 months ago

Hackers Abuse GitHub to Host Malicious Infrastructure

GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution…

12 months ago

Hackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary Commands

Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…

12 months ago

Free Decryptor Tool Released for the Black Basta Ransomware

A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor…

1 year ago