Unprecedented cyber attack hit State Infrastructure of Montenegro

3 years ago

The state Infrastructure of Montenegro was hit by a massive and "unprecedented" cyber attack, authorities announced. An unprecedented cyber attack…

Threat actor abuses Genshin Impact Anti-Cheat driver to disable antivirus

3 years ago

Threat actors abused a vulnerable anti-cheat driver for the Genshin Impact video game to disable antivirus software. Threat actors abused…

Critical flaw impacts Atlassian Bitbucket Server and Data Center

3 years ago

Atlassian addressed a critical vulnerability in Bitbucket Server and Data Center that could lead to malicious code execution on vulnerable instances. Atlassian…

Iran-linked Mercury APT exploited Log4Shell in SysAid Apps for initial access

3 years ago

An Iran-linked Mercury APT group exploited the Log4Shell vulnerability in SysAid applications for initial access to the targeted organizations. The Log4Shell…

GoldDragon campaign: North-Korea linked Kimsuky APT adopts victim verification technique

3 years ago

The North Korea-linked Kimsuky APT is behind a new campaign, tracked as GoldDragon, targeting political and diplomatic entities in South…

0ktapus phishing campaign: Twilio hackers targeted other 136 organizations

3 years ago

The threat actors behind Twilio and Cloudflare attacks have been linked to a phishing campaign that targeted other 136 organizations. The threat actors…

LastPass data breach: threat actors stole a portion of source code

3 years ago

Password management software firm LastPass has suffered a data breach, threat actors have stole source code and other data. Password…

Nobelium APT uses new Post-Compromise malware MagicWeb

3 years ago

Russia-linked APT group Nobelium is behind a new sophisticated post-exploitation malware tracked by Microsoft as MagicWeb. Microsoft security researchers discovered…

GAIROSCOPE attack allows to exfiltrate data from Air-Gapped systems via ultrasonic tones

3 years ago

GAIROSCOPE: An Israeli researcher demonstrated how to exfiltrate data from air-gapped systems using ultrasonic tones and smartphone gyroscopes. The popular…

Threat actors are using the Tox P2P messenger as C2 server

3 years ago

Threat actors are using the Tox peer-to-peer instant messaging service as a command-and-control server, Uptycs researchers reported. Tox is a…

This website uses cookies.