Cyber Attack

ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber AttacksApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks

ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks

A new large-scale campaign named "ApateWeb '' has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted…

1 year ago
Pawn Storm APT Launch Hash Relay Attacks on Government DepartmentsPawn Storm APT Launch Hash Relay Attacks on Government Departments

Pawn Storm APT Launch Hash Relay Attacks on Government Departments

In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on…

1 year ago
Hackers Use SYSTEMBC Tool to Maintain Access to Compromised NetworkHackers Use SYSTEMBC Tool to Maintain Access to Compromised Network

Hackers Use SYSTEMBC Tool to Maintain Access to Compromised Network

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…

1 year ago
SEC X Account was Hacked Using SIM Swapping MethodSEC X Account was Hacked Using SIM Swapping Method

SEC X Account was Hacked Using SIM Swapping Method

In a brazen act of digital deception, the U.S. Securities and Exchange Commission's (SEC) official Twitter account, @SECGov, was compromised…

1 year ago
Hackers Abuse GitHub to Host Malicious InfrastructureHackers Abuse GitHub to Host Malicious Infrastructure

Hackers Abuse GitHub to Host Malicious Infrastructure

GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution…

1 year ago
Hackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary CommandsHackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary Commands

Hackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary Commands

Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…

1 year ago
Free Decryptor Tool Released for the Black Basta RansomwareFree Decryptor Tool Released for the Black Basta Ransomware

Free Decryptor Tool Released for the Black Basta Ransomware

A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor…

1 year ago
Four Cyber Criminals Convicted of Spreading ChatGPT-Assisted RansomwareFour Cyber Criminals Convicted of Spreading ChatGPT-Assisted Ransomware

Four Cyber Criminals Convicted of Spreading ChatGPT-Assisted Ransomware

Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its…

1 year ago
Ubisoft Investigates Cyber Attack: Possible Data Exfiltration by HackersUbisoft Investigates Cyber Attack: Possible Data Exfiltration by Hackers

Ubisoft Investigates Cyber Attack: Possible Data Exfiltration by Hackers

Ubisoft, the renowned video game developer behind iconic franchises like Assassin's Creed and Far Cry, narrowly escaped a potentially devastating…

1 year ago
Hackers Stolen Over $58 Million in Crypto Via Malicious Google and X AdsHackers Stolen Over $58 Million in Crypto Via Malicious Google and X Ads

Hackers Stolen Over $58 Million in Crypto Via Malicious Google and X Ads

Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been…

1 year ago