Hacking

LogoKit update – The phishing kit leveraging Open Redirect VulnerabilitiesLogoKit update – The phishing kit leveraging Open Redirect Vulnerabilities

LogoKit update – The phishing kit leveraging Open Redirect Vulnerabilities

LogoKit - Threat actors leveraging Open Redirect Vulnerabilities popular in online services and apps to bypass spam filters in phishing…

3 years ago
Attackers abuse open redirects in Snapchat and Amex in phishing attacksAttackers abuse open redirects in Snapchat and Amex in phishing attacks

Attackers abuse open redirects in Snapchat and Amex in phishing attacks

Threat actors abuse open redirects on Snapchat and American Express to launch phishing attacks against Microsoft 365 users. Attackers abused…

3 years ago
Serious cyberattack hits German Chambers of Industry and Commerce (DIHK)Serious cyberattack hits German Chambers of Industry and Commerce (DIHK)

Serious cyberattack hits German Chambers of Industry and Commerce (DIHK)

A massive cyberattack hit the website of the German Chambers of Industry and Commerce (DIHK) this week. A massive attack…

3 years ago
Twitter confirms zero-day used to access data of 5.4 million accountsTwitter confirms zero-day used to access data of 5.4 million accounts

Twitter confirms zero-day used to access data of 5.4 million accounts

Twitter confirmed that the recent data breach that exposed data of 5.4 million accounts was caused by the exploitation of…

3 years ago
The popularity of Dark Utilities ‘C2-as-a-Service’ rapidly increasesThe popularity of Dark Utilities ‘C2-as-a-Service’ rapidly increases

The popularity of Dark Utilities ‘C2-as-a-Service’ rapidly increases

Dark Utilities "C2-as-a-Service" is attracting a growing number of customers searching for a command-and-control for their campaigns. The popularity of the…

3 years ago
DHS warns of critical flaws in Emergency Alert System encoder/decoder devicesDHS warns of critical flaws in Emergency Alert System encoder/decoder devices

DHS warns of critical flaws in Emergency Alert System encoder/decoder devices

The U.S. DHS warns of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. The Department of Homeland Security…

3 years ago
Mysterious threat actor TAC-040 used previously undetected Ljl BackdoorMysterious threat actor TAC-040 used previously undetected Ljl Backdoor

Mysterious threat actor TAC-040 used previously undetected Ljl Backdoor

A threat actor, tracked as TAC-040, exploited Atlassian Confluence flaw CVE-2022-26134 to deploy previously undetected Ljl Backdoor. Cybersecurity firm Deepwatch…

3 years ago
Unauthenticated RCE can allow hacking DrayTek Vigor routers without user interactionUnauthenticated RCE can allow hacking DrayTek Vigor routers without user interaction

Unauthenticated RCE can allow hacking DrayTek Vigor routers without user interaction

A critical flaw in multiple models of DrayTek Vigor routers can allow unauthenticated, remote attackers to fully compromise affected devices.…

3 years ago
Taiwan Government websites suffered DDoS attacks during the Nancy Pelosi visitTaiwan Government websites suffered DDoS attacks during the Nancy Pelosi visit

Taiwan Government websites suffered DDoS attacks during the Nancy Pelosi visit

Taiwan government websites were temporarily forced offline by cyber attacks during the visit to Taipei of US House Speaker Nancy…

3 years ago
Hackers stole $200 million from the Nomad crypto bridgeHackers stole $200 million from the Nomad crypto bridge

Hackers stole $200 million from the Nomad crypto bridge

The cryptocurrency bridge Nomad is the last victim of a cyber heist, threat actors stole almost $200 million of its…

3 years ago