watering hole

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…

9 years ago

Chinese hackers hit Forbes visitors with zero-day exploits

Security experts at Invincea and iSIGHT Partners uncovered a hacking campaign that used two distinct zero-day flaws to compromise Forbes.com…

9 years ago

Afghanistan CDN network compromised by Chinese hackers

Chinese hackers brought down all major Afghanistan Government websites by hacking an official CDN network used in the country. The…

9 years ago

Operation Pawn Storm is targeting military, government and media agencies

Trend Micro discovered a cyber-espionage operation dubbed  Operation Pawn Storm, which is targeting military, government and media entities worldwide. A…

10 years ago

iFrame-based redirection attacks used to monitor Chinese organizations

Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve…

10 years ago

AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance

Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several…

10 years ago

Cyber espionage campaign based on Havex RAT hit ICS/SCADA systems

Security Experts at F-Secure discovered a cyber espionage campaign based in the Havex malware targeting ICS/SCADA systems and vendors. Security…

10 years ago

FakeInst – Kaspersky discovered the first active Android SMS trojan

Kaspersky Lab has recently detected FakeInst, the first active SMS trojan for Android which targeted users in 66 countries, including…

10 years ago

A sophisticated phishing scheme is targeting Google Docs Users

Security Researchers at Symantec detected a new Sophisticated Phishing Scam that is targeting the Google Docs Users with complex social…

10 years ago

Abusing Facebook Access Token with Man-in-the-Middle Attack

The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user's traffic including access token.…

10 years ago

This website uses cookies.