Cyber Attack

14-Year-Old CMS Editor Flaw Exploited to Hack Govt & Edu Sites14-Year-Old CMS Editor Flaw Exploited to Hack Govt & Edu Sites

14-Year-Old CMS Editor Flaw Exploited to Hack Govt & Edu Sites

Hackers have exploited a vulnerability in a 14-year-old Content Management System (CMS) editor, FCKeditor, to launch SEO poisoning attacks against…

1 year ago
Hackers Actively Hijacking ConnectWise ScreenConnect serverHackers Actively Hijacking ConnectWise ScreenConnect server

Hackers Actively Hijacking ConnectWise ScreenConnect server

ConnectWise, a prominent software company, issued an urgent security bulletin on February 19, 2024, revealing two significant vulnerabilities in its…

1 year ago
Turla APT’c New Tool Designed to Steal Login CredentialsTurla APT’c New Tool Designed to Steal Login Credentials

Turla APT’c New Tool Designed to Steal Login Credentials

The Russian cyber espionage threat group "Turla APT group" was discovered to be using a new backdoor for its malicious…

1 year ago
Ukrainian Hacker Pleads Guilty for Leading Zeus & IcedID Malware AttacksUkrainian Hacker Pleads Guilty for Leading Zeus & IcedID Malware Attacks

Ukrainian Hacker Pleads Guilty for Leading Zeus & IcedID Malware Attacks

Vyacheslav Igorevich Penchukov, a 37-year-old resident of Donetsk, Ukraine, has pleaded guilty to his key role in developing and deploying…

1 year ago
How to Analyze the MITRE Engenuity ATT&CK® Evaluations: EnterpriseHow to Analyze the MITRE Engenuity ATT&CK® Evaluations: Enterprise

How to Analyze the MITRE Engenuity ATT&CK® Evaluations: Enterprise

Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…

1 year ago
ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber AttacksApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks

ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks

A new large-scale campaign named "ApateWeb '' has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted…

1 year ago
Pawn Storm APT Launch Hash Relay Attacks on Government DepartmentsPawn Storm APT Launch Hash Relay Attacks on Government Departments

Pawn Storm APT Launch Hash Relay Attacks on Government Departments

In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on…

1 year ago
Hackers Use SYSTEMBC Tool to Maintain Access to Compromised NetworkHackers Use SYSTEMBC Tool to Maintain Access to Compromised Network

Hackers Use SYSTEMBC Tool to Maintain Access to Compromised Network

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…

1 year ago
SEC X Account was Hacked Using SIM Swapping MethodSEC X Account was Hacked Using SIM Swapping Method

SEC X Account was Hacked Using SIM Swapping Method

In a brazen act of digital deception, the U.S. Securities and Exchange Commission's (SEC) official Twitter account, @SECGov, was compromised…

1 year ago
Hackers Abuse GitHub to Host Malicious InfrastructureHackers Abuse GitHub to Host Malicious Infrastructure

Hackers Abuse GitHub to Host Malicious Infrastructure

GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution…

1 year ago