Home Cyberattack News

Cyberattack News

Stay ahead of evolving threats with our dedicated Cyberattack News category. We provide real-time updates on ransomware outbreaks, data breaches, and phishing scams targeting businesses and individuals globally.

Our expert team analyzes the latest incidents, uncovering how attacks happened and their potential impact. From detailed threat breakdowns to actionable security tips, we help you understand and protect against emerging cyber risks.

Red Team Tools in RDP Attacks

Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...

In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been linked to a massive rogue Remote Desktop Protocol (RDP) campaign. Earth...
Kerio Control Firewall

1-Click RCE Attack in Kerio Control UTM Let Attackers Gain Root Access To the...

Researchers have identified a critical set of HTTP Response Splitting vulnerabilities in Kerio Control, a widely used Unified Threat Management (UTM) solution developed by GFI Software. The impact is severe, potentially enabling attackers to escalate...
HTML Functions Exploited  to Bypass Email Security Filters

Hackers Exploiting HTML Functions to Bypass Email Security Filters

Cybercriminals increasingly leverage sophisticated HTML techniques to circumvent email security filters, putting users and organizations at greater risk of falling victim to phishing attacks. These attacks, often disguised as legitimate documents such as invoices...
Threat Hunting Via Passive DNS

Uncovering Attacker’s Infrastructure & Tactics Via Passive DNS

In the ever-evolving landscape of cybersecurity, understanding how attackers establish and maintain their attack infrastructure is crucial for building robust defenses. A recent study by Juniper Threat Labs sheds light on the sophisticated methods attackers...
Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins

Hackers Attacking Sporting Events Via Fake Domains To Steal Logins

Cybercriminals leverage high-profile events, such as global sporting championships, by registering fake domains to launch phishing and scam attacks. Researchers uncover suspicious domain registration campaigns, especially when event-specific terms or phrases are used in recently...
Deloitte Hacked

Deloitte Hacked – Brain Cipher Ransomware Group Allegedly Stolen 1 TB of Data

Notorious ransomware group Brain Cipher has claimed to have breached Deloitte UK, allegedly exfiltrating over 1 terabyte of sensitive data from the professional services giant. Brain Cipher is a ransomware group that emerged in June...
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to protect users from web-based attacks such as phishing and malware. This new way to...
Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. Citizens Data

Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. Citizens Data

A Chinese hacking campaign, codenamed "Salt Typhoon" by Microsoft, has infiltrated more than 8 American telecommunications companies, stealing vast amounts of U.S. citizens' phone data. Officials describe it as one of the largest intelligence compromises...
Pegasus Spyware

Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices

Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed "Rainbow Ronin"), showing that spyware targets not only activists and journalists but also professionals and civilians. The...
AWS Security Incident Response

AWS Launched New Security Incident Response Service to Boost Enterprise Security

Amazon Web Services (AWS) unveiled a new service, AWS Security Incident Response, designed to help organizations manage security events efficiently. As cyber threats become increasingly complex, this service offers a comprehensive solution to prepare...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...