Cyber Attack

Hackers Use SYSTEMBC Tool to Maintain Access to Compromised Network

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…

1 year ago

SEC X Account was Hacked Using SIM Swapping Method

In a brazen act of digital deception, the U.S. Securities and Exchange Commission's (SEC) official Twitter account, @SECGov, was compromised…

1 year ago

Hackers Abuse GitHub to Host Malicious Infrastructure

GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution…

1 year ago

Hackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary Commands

Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…

1 year ago

Free Decryptor Tool Released for the Black Basta Ransomware

A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor…

1 year ago

Four Cyber Criminals Convicted of Spreading ChatGPT-Assisted Ransomware

Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its…

1 year ago

Ubisoft Investigates Cyber Attack: Possible Data Exfiltration by Hackers

Ubisoft, the renowned video game developer behind iconic franchises like Assassin's Creed and Far Cry, narrowly escaped a potentially devastating…

1 year ago

Hackers Stolen Over $58 Million in Crypto Via Malicious Google and X Ads

Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been…

1 year ago

Ledger NPM Repo Hacked Through a Spear Phishing Attack on an Employee

In a recent turn of events, Ledger, a prominent hardware wallet provider, faced a security breach that sent shockwaves through…

1 year ago

Chinese Hackers Seized Outdated Routers for Covert Data Transfer

Volt Typhoon, also known as the Bronze Silhouette, has been discovered to be linked with a complex botnet called "KV-botnet."…

1 year ago