Category

Telecommunications

Telecommunications Page 2

Cicada group Zerologon Vulnerability Japanese Organizations apt10 stone panda

Cicada Group exploits Zerologon on targeted Japanese Organizations

The researchers’ recent discovery that exposes the Microsoft platform’s Zerologon vulnerability is making noise within the Cybersecurity community. Tagged as CVE-2020-1442, it is the vulnerability that adversaries can exploit to gain access to the Domain Controller of the network through compromised elevated privileged accounts. In this scenario, adversaries can access the network by ciphering the...
Continue Reading
microsoft office 365 phishing email campaign

A sophisticated phishing email targeting Office 365 users is in the wild

Microsoft has warned the public about a new phishing campaign targeting Office 365 users via their Twitter account on Tuesday, November 17th.       This newly discovered phishing email was seemingly a sophisticated one, as it was designed to bypass and dodge secure email gateways as per the Microsoft analysis. The Threat actors behind...
Continue Reading
ransomware attack multi cloud infrastructure malware trojan

Ransomware advances on Multi-Cloud Infrastructure

The first documentation of a ransomware attack was in the year 1989. A Harvard-educated biologist developed the malware where a compromised diskette named “AIDS Information – Introductory Diskettes” were dispersed to the attendees of an internal conference and spread to more than 90 countries. These give a concept to cybercriminals that they can monetize from...
Continue Reading
cms platforms KashmirBlack BotNet attack wordpress joomla drupal

Popular CMS Platforms afflicted by massive Botnet Attack

Enterprise and Corporations who use CMS platforms must be extra vigilant because the cyber-attacks against different platforms such as Joomla, Drupal, and WordPress are prevalent and rampant. Cybersecurity researchers recently discovered a barrage of botnet attacks on multiple CMS (Content Management Systems) platforms, infecting thousands of websites simultaneously. Companies like Drupal, WordPress, and Joomla! were...
Continue Reading
fortinet vpn security vulnerability

Fortinet Vulnerability default open access to hackers

With the ongoing pandemic, more businesses lean toward using the work from home setup. Thus, many adversaries try to exploit all possibilities to do their schemes to employees connected to their company system in their home comfort. This makes them more susceptible to hackers as security is lessened, just like the report submitted by the...
Continue Reading
TrickBot Malware BazarBackDoor Payload antimalware

TrickBot Malware’s powerful new weapon – BazarBackDoor

Just recently, the number of hacking attacks on remote connections skyrocketed. The apparent target of those attacks is the remote employees to take over their corporate machines. The coordinated attacks on RDP connections were caused by an augmented version of the ill-famed Trojan, TrickBot. It would appear that these TrickBot developers have found a new...
Continue Reading
emotet malware spam campaign windows 10 update

Emotet Malware pretend as Windows 10 Update attachment

Another twist on the Emotet botnet has been observed by security researchers to further its malicious agenda. It is now pretending to be an attachment from Windows Update telling the receivers of the spam email to update their Microsoft Word application. As we all know, Emotet is a type of malware that gets distributed via...
Continue Reading
unlimited phishing pages google app engine antiphishing soft routing

Unlimited phishing pages through Google App Engine

The latest discovered technique that can be abused to create and deliver phishing pages and financial malware while avoiding leading enterprise-grade security products was found by a cybersecurity researcher using Google App Engine domains. Google App Engine is a cloud service platform for developing and deploying web applications on Google’s servers. There are phishing campaigns...
Continue Reading
chinese apt actors group hackers linux OS Advanced Persistent Threats

Collaborative attack between Chinese APT Actors on Linux

A collaborative attack has been unwrapped recently by cybersecurity experts that have been targeting the Linux Operating System. Developers such as Red Hat Enterprise, CentOS, and Debian are said to be the focus of this malicious attack. According to the uncovered pieces of evidence, the attack was perpetrated by 5 different Advanced Persistent Threats (APT)...
Continue Reading
lucifer malware linux botnet antimalware spear phishing email

Lucifer Malware on Linux

With its sudden popularity and discovery in May 2020, Lucifer botnet malware again makes noise within the Cybersecurity community. A new report has confirmed that the latest update of the malware becomes more lethal as this can now infect a network that uses the Linux Operating system. With it already being a powerful tool for...
Continue Reading
1 2 3 4