The Storting, Norway’s parliament, have suffered another cyber-attack leading to threat actors stealing data and gaining access to their network systems. This has been done using the recently disclosed Microsoft Exchange vulnerabilities. Microsoft has recently issued an emergency out of band patch addressing the multiple zero-day exploitable vulnerabilities discovered on the Microsoft Exchange Server....Continue Reading
A newly detected persistent threat attack group with probable ties to Hezbollah has been using a ‘retooled’ version of its malware with a new version of remote access trojan or RAT to penetrate organisations’ cyber defences worldwide aiming to exfiltrate valuable data. On a recent report published by a security research team last Thursday, the...Continue Reading
SonicWall, a security hardware manufacturer, has recently issued an urgent security notice regarding threat actors possibly exploiting a zero-day vulnerability on some of their VPN products to conduct cyber-attack exploits to their network and infrastructure systems. Catering to SME and large enterprise organizations and companies, SonicWall is a well-known hardware firewall system device manufacturer which...Continue Reading
Blackhats who do not run away will continuously cause havoc and insecure private data breach to individuals and companies. Though it is rare for adversaries to honour their customers, yesterday the doubt of security researchers and adversaries were proven wrong. Both onion and Clearnet version of the Genesis Market website is up and running. Yet,...Continue Reading
The latest mobile network technology 5G is being rolled out gradually on major cities around the world. In line with the infrastructure deployments, analysis of the network architecture has revealed some potential weakness insecurity that when exploited by hackers and threat actors can enable them to perform cyber-attacks such as a denial of service to...Continue Reading
With the pandemic crisis that we are facing today, the Internet has become a necessity. The government’s lockdown and social distancing force us to relay our everyday activities such as shopping, financial transaction, and communication to online websites. The increased usage of the Internet leads to more cyber-attacks that target individuals and companies via fraudulent...Continue Reading
The researchers’ recent discovery that exposes the Microsoft platform’s Zerologon vulnerability is making noise within the Cybersecurity community. Tagged as CVE-2020-1442, it is the vulnerability that adversaries can exploit to gain access to the Domain Controller of the network through compromised elevated privileged accounts. In this scenario, adversaries can access the network by ciphering the...Continue Reading
Microsoft has warned the public about a new phishing campaign targeting Office 365 users via their Twitter account on Tuesday, November 17th. This newly discovered phishing email was seemingly a sophisticated one, as it was designed to bypass and dodge secure email gateways as per the Microsoft analysis. The Threat actors behind...Continue Reading
The first documentation of a ransomware attack was in the year 1989. A Harvard-educated biologist developed the malware where a compromised diskette named “AIDS Information – Introductory Diskettes” were dispersed to the attendees of an internal conference and spread to more than 90 countries. These give a concept to cybercriminals that they can monetize from...Continue Reading
Enterprise and Corporations who use CMS platforms must be extra vigilant because the cyber-attacks against different platforms such as Joomla, Drupal, and WordPress are prevalent and rampant. Cybersecurity researchers recently discovered a barrage of botnet attacks on multiple CMS (Content Management Systems) platforms, infecting thousands of websites simultaneously. Companies like Drupal, WordPress, and Joomla! were...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.