U.S  Cyber Attacks on China

U.S Intelligence Agencies Launched Cyber Attack on Chinese Tech Companies

The Chinese National Internet Emergency Center has discovered and resolved two significant cases of cyber espionage targeting Chinese technology companies and research institutions. The attacks, suspected to have been orchestrated by U.S. intelligence agencies,...
Researchers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Researchers Uncovered Zloader DNS Tunneling Tactics For C2 Communication

An updated version of Zloader (2.9.4.0) has been discovered, which includes a Domain Name System (DNS) tunnel for command-and-control (C2) connections, an interactive shell for hands-on keyboard action, and additional features that improve the...
Wireshark 4.4.2 Released

Wireshark 4.4.2: Fixes Vulnerabilities & Enhances Protocol Support

The Wireshark Foundation has announced the release of Wireshark 4.4.2, the latest version of its widely-used network protocol analyzer. This update brings many improvements, including critical bug fixes and enhanced protocol support, further solidifying Wireshark's...
How To Protect An RDP Server From Brute-Force Attacks

How To Protect An RDP Server From Brute-Force Attacks

Did you know that a sixteen-letter password is considered unhackable? And what is more expensive: the server or the information stored on it (or was stored on it)? We decided to write a short...
Dell Enterprise SONiC Vulnerabilities Let Attackers Compromise The System

Dell Enterprise SONiC Vulnerabilities Let Attackers Compromise The System

Dell Technologies has disclosed three critical security vulnerabilities affecting its Enterprise SONiC (Software for Open Networking in the Cloud) operating system. These vulnerabilities could allow attackers to compromise affected systems. The vulnerabilities, identified as CVE-2024-45763,...
PfSense Stored XSS Vulnerability Leads To RCE Attacks, PoC Published

PfSense Stored XSS Vulnerability Leads To RCE Attacks, PoC Published

A critical security vulnerability has been discovered in pfSense version 2.5.2, potentially allowing attackers to execute arbitrary code on affected systems. The flaw, identified as CVE-2024-46538, is a stored cross-site scripting (XSS) vulnerability that...
Canadian Cyber Centre Warns Of Chinese Hackers Scanning IT Systems

Canadian Cyber Centre Warns Of Chinese Hackers Scanning IT Systems

The Canadian Centre for Cyber Security has warned that a sophisticated Chinese state-sponsored cyber threat actor has been actively scanning Canadian cyber defenses throughout 2024, targeting critical institutions and infrastructure. The reconnaissance scanning has targeted...
Hackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks

Hackers Exploit SonicWall VPNs to Deploy Fog & Akira Ransomware

Hackers target VPNs primarily to exploit vulnerabilities that allow them to gain unauthorized access to enterprise networks. By infiltrating these systems, hackers aim to identify enterprise assets and establish a foothold for further exploitation. Arctic Wolf...
Hackers Exploiting Ivanti CSA Zero-days To Compromise Victims’ Networks

Nation-State Actors Exploiting Ivanti CSA 0-days To Compromise Victims’ Networks

Researchers have uncovered a sophisticated attack campaign targeting Ivanti Cloud Services Appliance (CSA) users. Nation-state actors are exploiting multiple zero-day vulnerabilities in the CSA to gain unauthorized access to victims' networks and establish a...
VMware NSX Vulnerabilities Allow Hackers To Execute Arbitrary Commands

VMware NSX Vulnerabilities Allow Hackers To Execute Arbitrary Commands

VMware has issued a critical advisory (VMSA-2024-0020) detailing multiple vulnerabilities in its NSX and Cloud Foundation products. These vulnerabilities, identified as CVE-2024-38818, CVE-2024-38817, and CVE-2024-38815, could potentially allow malicious actors to execute arbitrary commands,...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...