Home Cyberattack News

Cyberattack News

Stay ahead of evolving threats with our dedicated Cyberattack News category. We provide real-time updates on ransomware outbreaks, data breaches, and phishing scams targeting businesses and individuals globally.

Our expert team analyzes the latest incidents, uncovering how attacks happened and their potential impact. From detailed threat breakdowns to actionable security tips, we help you understand and protect against emerging cyber risks.

Red Team Tools in RDP Attacks

Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...

In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been...
Kerio Control Firewall

1-Click RCE Attack in Kerio Control UTM Let Attackers Gain Root Access To the...

Researchers have identified a critical set of HTTP Response Splitting vulnerabilities in Kerio Control, a widely used Unified Threat Management (UTM) solution developed by...
HTML Functions Exploited  to Bypass Email Security Filters

Hackers Exploiting HTML Functions to Bypass Email Security Filters

Cybercriminals increasingly leverage sophisticated HTML techniques to circumvent email security filters, putting users and organizations at greater risk of falling victim to phishing attacks....
Threat Hunting Via Passive DNS

Uncovering Attacker’s Infrastructure & Tactics Via Passive DNS

In the ever-evolving landscape of cybersecurity, understanding how attackers establish and maintain their attack infrastructure is crucial for building robust defenses. A recent study by...
Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins

Hackers Attacking Sporting Events Via Fake Domains To Steal Logins

Cybercriminals leverage high-profile events, such as global sporting championships, by registering fake domains to launch phishing and scam attacks. Researchers uncover suspicious domain registration campaigns,...
Deloitte Hacked

Deloitte Hacked – Brain Cipher Ransomware Group Allegedly Stolen 1 TB of Data

Notorious ransomware group Brain Cipher has claimed to have breached Deloitte UK, allegedly exfiltrating over 1 terabyte of sensitive data from the professional services...
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to protect users from web-based...
Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. Citizens Data

Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. Citizens Data

A Chinese hacking campaign, codenamed "Salt Typhoon" by Microsoft, has infiltrated more than 8 American telecommunications companies, stealing vast amounts of U.S. citizens' phone...
Pegasus Spyware

Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices

Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed "Rainbow Ronin"), showing that spyware targets...
AWS Security Incident Response

AWS Launched New Security Incident Response Service to Boost Enterprise Security

Amazon Web Services (AWS) unveiled a new service, AWS Security Incident Response, designed to help organizations manage security events efficiently. As cyber threats become...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...