Operation Destabilise, Authorities Dismateled Cybercriminals Money Laundering Network
In a major international operation codenamed "Operation Destabilise," law enforcement agencies have successfully dismantled sophisticated Russian money laundering networks that served cybercriminals, drug traffickers, and sanctioned Russian elites worldwide.
The operation, led by the National...
WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies
A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to cyberattacks, according to Zafran, a leading cybersecurity research team.
The...
Russian TAG-110 Attacking Users With HATVIBE And CHERRYSPY Hacking Tools
TAG-110, a threat group affiliated with Russia, is conducting an ongoing cyber-espionage effort targeting Central Asia, East Asia, and European organizations.
The group mainly targets government agencies, human rights organizations, and educational institutions with custom...
Hackers Abuse Avast Anti-Rootkit Driver To Evade Detection
A malicious campaign has been discovered in which the malware employs a more nefarious tactic, dropping the legitimate Avast Anti-Rootkit driver (aswArPot.sys) to evade detection.
The malware takes advantage of the driver's deep access to...
Interpol Arrested 1,000+ Cybercriminals and Dismantled 130,000+ Malicious Networks
A joint operation by INTERPOL and AFRIPOL has led to the arrest of 1,006 suspects and the dismantling of 134,089 malicious infrastructures across 19 African countries.
The operation, codenamed Operation Serengeti, targeted cybercriminals involved...
Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows
In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux environments.
The study, conducted by Haitham S. Al-Sinani from the...
T-Mobile Spotted Chinese Salt Typhoon Hackers Attacking Its Routers
T-Mobile revealed how it successfully blocked attempts by the Chinese hacking group Salt Typhoon to infiltrate its network.
This announcement follows reports from earlier this month about Salt Typhoon's successful breaches of wiretap systems managed...
New Windows 11 Integer Overflow Vulnerability Lets Attackers Elevate Privileges
A critical security flaw in Windows 11 has been discovered, allowing attackers to gain elevated system privileges through an integer overflow vulnerability.
The exploit, which affects the ksthunk.sys driver was successfully demonstrated at the recent...
Active Directory Certificate Services Vulnerability Let Attackers Escalate Privileges
A critical vulnerability in Microsoft's Active Directory Certificate Services (AD CS) that could allow attackers to escalate privileges and potentially gain domain admin access.
This new exploit, dubbed ESC15 or "EKUwu," was discovered by...
Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory
A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA).
On...