Cyber Attack

Hackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary CommandsHackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary Commands

Hackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary Commands

Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…

1 year ago
Free Decryptor Tool Released for the Black Basta RansomwareFree Decryptor Tool Released for the Black Basta Ransomware

Free Decryptor Tool Released for the Black Basta Ransomware

A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor…

1 year ago
Four Cyber Criminals Convicted of Spreading ChatGPT-Assisted RansomwareFour Cyber Criminals Convicted of Spreading ChatGPT-Assisted Ransomware

Four Cyber Criminals Convicted of Spreading ChatGPT-Assisted Ransomware

Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its…

1 year ago
Ubisoft Investigates Cyber Attack: Possible Data Exfiltration by HackersUbisoft Investigates Cyber Attack: Possible Data Exfiltration by Hackers

Ubisoft Investigates Cyber Attack: Possible Data Exfiltration by Hackers

Ubisoft, the renowned video game developer behind iconic franchises like Assassin's Creed and Far Cry, narrowly escaped a potentially devastating…

1 year ago
Hackers Stolen Over $58 Million in Crypto Via Malicious Google and X AdsHackers Stolen Over $58 Million in Crypto Via Malicious Google and X Ads

Hackers Stolen Over $58 Million in Crypto Via Malicious Google and X Ads

Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been…

1 year ago
Ledger NPM Repo Hacked Through a Spear Phishing Attack on an EmployeeLedger NPM Repo Hacked Through a Spear Phishing Attack on an Employee

Ledger NPM Repo Hacked Through a Spear Phishing Attack on an Employee

In a recent turn of events, Ledger, a prominent hardware wallet provider, faced a security breach that sent shockwaves through…

1 year ago
Chinese Hackers Seized Outdated Routers for Covert Data TransferChinese Hackers Seized Outdated Routers for Covert Data Transfer

Chinese Hackers Seized Outdated Routers for Covert Data Transfer

Volt Typhoon, also known as the Bronze Silhouette, has been discovered to be linked with a complex botnet called "KV-botnet."…

1 year ago
Russian Hackers Exploiting JetBrain Vulnerability to Hack ServersRussian Hackers Exploiting JetBrain Vulnerability to Hack Servers

Russian Hackers Exploiting JetBrain Vulnerability to Hack Servers

The Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and other co-authoring agencies have issued a warning that…

1 year ago
Quishing: New Sophisticated Phishing Attacks on the RiseQuishing: New Sophisticated Phishing Attacks on the Rise

Quishing: New Sophisticated Phishing Attacks on the Rise

Phishing, a persistent cyberthreat, has evolved with the times. Once a symbol of convenience, QR codes are now being weaponized…

1 year ago
Toyota Ransomware Attack Exposes Customers Personal DataToyota Ransomware Attack Exposes Customers Personal Data

Toyota Ransomware Attack Exposes Customers Personal Data

Toyota Financial Services (TFS) notifies customers after a data breach that exposed personal and sensitive financial information. In a limited…

1 year ago