Hacking

Abusing Windows RDP servers to amplify DDoS attacks

Threat actors are abusing Windows Remote Desktop Protocol (RDP) servers to amplify Distributed Denial of Service (DDoS) attacks. Attackers are…

5 years ago

Passwords stolen via phishing campaign available through Google search

Bad ops of operators of a phishing campaign exposed credentials stolen in attacks and made them publicly available through Google…

5 years ago

Experts warn of scanning activity for critical SAP SolMan flaw after the release of exploit

Experts warn of automated scanning activity for servers affected by a critical SAP SolMan flaw after the release of an…

5 years ago

SolarWinds Attack: Microsoft sheds lights into Solorigate second-stage activation

Microsoft's report provides details of the entire SolarWinds attack chain with a deep dive in the second-stage activation of malware…

5 years ago

Logic bugs found in popular apps, including Signal and FB Messenger

Flaws in popular messaging apps, such as Signal and FB Messenger allowed to force a target device to transmit audio…

5 years ago

Livecoin halted operations after the December attack

The Russian cryptocurrency exchange Livecoin has announced it is terminating its operation following the December cyberattack.  The Russian cryptocurrency exchange…

5 years ago

FireEye releases an auditing tool to detect SolarWinds hackers’ activity

Cybersecurity firm FireEye has released a report that sheds the light on the SolarWinds attack and the way hackers breached…

5 years ago

Malwarebytes ‘s email systems hacked by SolarWinds attackers

Cyber security firm Malwarebytes announced that threat actor behind the SolarWinds attack also breached its network last year. Malwarebytes revealed…

5 years ago

Raindrop, a fourth malware employed in SolarWinds attacks

The threat actors behind the SolarWinds attack used malware dubbed Raindrop for lateral movement and deploying additional payloads. Security experts…

5 years ago

FreakOut botnet target 3 recent flaws to compromise Linux devices

Security researchers uncovered a series of attacks conducted by the FreakOut botnet that leveraged recently discovered vulnerabilities. Security researchers from…

5 years ago

This website uses cookies.