Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...
In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been linked to a massive rogue Remote Desktop Protocol (RDP) campaign.
Earth...
1-Click RCE Attack in Kerio Control UTM Let Attackers Gain Root Access To the...
Researchers have identified a critical set of HTTP Response Splitting vulnerabilities in Kerio Control, a widely used Unified Threat Management (UTM) solution developed by GFI Software.
The impact is severe, potentially enabling attackers to escalate...
Hackers Exploiting HTML Functions to Bypass Email Security Filters
Cybercriminals increasingly leverage sophisticated HTML techniques to circumvent email security filters, putting users and organizations at greater risk of falling victim to phishing attacks.
These attacks, often disguised as legitimate documents such as invoices...
Uncovering Attacker’s Infrastructure & Tactics Via Passive DNS
In the ever-evolving landscape of cybersecurity, understanding how attackers establish and maintain their attack infrastructure is crucial for building robust defenses.
A recent study by Juniper Threat Labs sheds light on the sophisticated methods attackers...
Hackers Attacking Sporting Events Via Fake Domains To Steal Logins
Cybercriminals leverage high-profile events, such as global sporting championships, by registering fake domains to launch phishing and scam attacks.
Researchers uncover suspicious domain registration campaigns, especially when event-specific terms or phrases are used in recently...
Deloitte Hacked – Brain Cipher Ransomware Group Allegedly Stolen 1 TB of Data
Notorious ransomware group Brain Cipher has claimed to have breached Deloitte UK, allegedly exfiltrating over 1 terabyte of sensitive data from the professional services giant.
Brain Cipher is a ransomware group that emerged in June...
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security
Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to protect users from web-based attacks such as phishing and malware.
This new way to...
Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. Citizens Data
A Chinese hacking campaign, codenamed "Salt Typhoon" by Microsoft, has infiltrated more than 8 American telecommunications companies, stealing vast amounts of U.S. citizens' phone data.
Officials describe it as one of the largest intelligence compromises...
Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices
Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed "Rainbow Ronin"), showing that spyware targets not only activists and journalists but also professionals and civilians.
The...
AWS Launched New Security Incident Response Service to Boost Enterprise Security
Amazon Web Services (AWS) unveiled a new service, AWS Security Incident Response, designed to help organizations manage security events efficiently.
As cyber threats become increasingly complex, this service offers a comprehensive solution to prepare...