Cyber Attack

US-Seized Crypto Currency Mixer Used by North Korean Lazarus HackersUS-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group…

1 year ago
North Korean Hackers Attacking macOS Using Weaponized DocumentsNorth Korean Hackers Attacking macOS Using Weaponized Documents

North Korean Hackers Attacking macOS Using Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code. All these documents…

1 year ago
Poloniex Offered $10 Million Reward to Hacker for Return of $120 MillionPoloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex is a popular cryptocurrency exchange platform headquartered in the United States that provides a diverse range of digital assets…

1 year ago
Former Infosec COO Pleads Guilty for Hacking HospitalsFormer Infosec COO Pleads Guilty for Hacking Hospitals

Former Infosec COO Pleads Guilty for Hacking Hospitals

Former COO of the Atlanta-based cybersecurity company Securolytics, Vikas Singla, launched a series of cyberattacks on the non-profit healthcare organization…

1 year ago
20+ Companies Hacked in Massive Cyber Attack on Critical Infrastructure20+ Companies Hacked in Massive Cyber Attack on Critical Infrastructure

20+ Companies Hacked in Massive Cyber Attack on Critical Infrastructure

In an alarming development, Denmark faced its most extensive cyber attack in May 2023, targeting crucial components of its energy…

1 year ago
Sapphire Sleet Hackers Attacking LinkedIn Users Based on Their ExpertiseSapphire Sleet Hackers Attacking LinkedIn Users Based on Their Expertise

Sapphire Sleet Hackers Attacking LinkedIn Users Based on Their Expertise

In a recent development, cybersecurity experts have identified a significant shift in the tactics employed by Sapphire Sleet, a notorious…

2 years ago
Russian Hackers Hijacked Power Station Circuit Breakers Using LotL TechniqueRussian Hackers Hijacked Power Station Circuit Breakers Using LotL Technique

Russian Hackers Hijacked Power Station Circuit Breakers Using LotL Technique

In a recent and alarming development, the notorious Russia-linked threat actor Sandworm executed a sophisticated cyber-physical attack targeting a critical…

2 years ago
BlueNoroff Hackers Attacking Apple Users with New macOS MalwareBlueNoroff Hackers Attacking Apple Users with New macOS Malware

BlueNoroff Hackers Attacking Apple Users with New macOS Malware

A new malware variant is distributed by BlueNordoff APT group, a financially motivated threat group targeting cryptocurrency exchanges, venture capital…

2 years ago
Hackers Actively Exploiting Big-IP and Citrix VulnerabilitiesHackers Actively Exploiting Big-IP and Citrix Vulnerabilities

Hackers Actively Exploiting Big-IP and Citrix Vulnerabilities

Experts issued security alerts concerning the ongoing exploitation of Big-IP (CVE-2023-46747, CVE-2023-46748) and Citrix (CVE-2023-4966) vulnerabilities. The publicly available Proof…

2 years ago
Uncovering Prolific Puma, Massive Domain Generator & URL ShortenerUncovering Prolific Puma, Massive Domain Generator & URL Shortener

Uncovering Prolific Puma, Massive Domain Generator & URL Shortener

Hackers can exploit Massive Domain Generator and URL Shortener services by creating large numbers of deceptive or malicious domains and…

2 years ago