Cyber Attack

Chinese Hackers Seized Outdated Routers for Covert Data TransferChinese Hackers Seized Outdated Routers for Covert Data Transfer

Chinese Hackers Seized Outdated Routers for Covert Data Transfer

Volt Typhoon, also known as the Bronze Silhouette, has been discovered to be linked with a complex botnet called "KV-botnet."…

1 year ago
Russian Hackers Exploiting JetBrain Vulnerability to Hack ServersRussian Hackers Exploiting JetBrain Vulnerability to Hack Servers

Russian Hackers Exploiting JetBrain Vulnerability to Hack Servers

The Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and other co-authoring agencies have issued a warning that…

1 year ago
Quishing: New Sophisticated Phishing Attacks on the RiseQuishing: New Sophisticated Phishing Attacks on the Rise

Quishing: New Sophisticated Phishing Attacks on the Rise

Phishing, a persistent cyberthreat, has evolved with the times. Once a symbol of convenience, QR codes are now being weaponized…

1 year ago
Toyota Ransomware Attack Exposes Customers Personal DataToyota Ransomware Attack Exposes Customers Personal Data

Toyota Ransomware Attack Exposes Customers Personal Data

Toyota Financial Services (TFS) notifies customers after a data breach that exposed personal and sensitive financial information. In a limited…

1 year ago
Russian Star Blizzard New Evasion Techniques to Hijack Email AccountsRussian Star Blizzard New Evasion Techniques to Hijack Email Accounts

Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts

Hackers target email accounts because they contain valuable personal and financial information. Successful email breaches enable threat actors to:- Identity…

1 year ago
Doppelgänger: Hackers Employ AI to Launch Highly sophistication AttacksDoppelgänger: Hackers Employ AI to Launch Highly sophistication Attacks

Doppelgänger: Hackers Employ AI to Launch Highly sophistication Attacks

It has been observed that threat actors are using AI technology to conduct illicit operations on social media platforms. These…

1 year ago
US-Seized Crypto Currency Mixer Used by North Korean Lazarus HackersUS-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group…

1 year ago
North Korean Hackers Attacking macOS Using Weaponized DocumentsNorth Korean Hackers Attacking macOS Using Weaponized Documents

North Korean Hackers Attacking macOS Using Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code. All these documents…

1 year ago
Poloniex Offered $10 Million Reward to Hacker for Return of $120 MillionPoloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex is a popular cryptocurrency exchange platform headquartered in the United States that provides a diverse range of digital assets…

1 year ago
Former Infosec COO Pleads Guilty for Hacking HospitalsFormer Infosec COO Pleads Guilty for Hacking Hospitals

Former Infosec COO Pleads Guilty for Hacking Hospitals

Former COO of the Atlanta-based cybersecurity company Securolytics, Vikas Singla, launched a series of cyberattacks on the non-profit healthcare organization…

1 year ago