Cyberwarfare Cyber espionage is the name of the game as art of warfare has shifted from physical to cyberspace; we only see this in the movies and now a reality when state sponsored hackers are finding its way into the cyberspace for supremacy, and once again a mysterious hackers repurposed and recycled sophisticated cyber tools...Continue Reading
One seriously threatening part about data breaches and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...Continue Reading
Perceptics, the firm that bills itself as “the sole provider of stationary LPRs” (license plate readers) at border crossing lanes for privately owned vehicles in the U.S., has been hacked. Tens of thousands of its internal files are now reportedly floating around the dark web for anyone to download. According to several cyber-security research consultants,...Continue Reading
Authorities were investigating the online posting by hackers on Saturday. The personal information of hundreds of federal agents and police officers apparently stolen from websites affiliated with alumni of the FBI’s National Academy. Cyber Security Researchers counted at least 1,400 unique records of employees of the FBI, Secret Service, Capitol Police, U.S. Park Police and...Continue Reading
Cyber security researchers have just discovered a new malware, called “Linux Rabbit,” that targeted Linux servers and Internet-of-Things (IoT) devices in a campaign that began in August 2018 and continued until October 2018. The campaign targeted devices in Russia, South Korea, the UK, and the US. The campaign utilizes two strains of malware that share...Continue Reading
A newly identified MacOS backdoor detected by AV companies as OSX_OCEANLOTUS.D that is perceived as the latest version of a threat used by OceanLotus (a.k.a. APT 32, APT-C-00, SeaLotus, and Cobalt Kitty). OceanLotus was responsible for launching targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms. The attackers behind...Continue Reading
Cybercriminals behind the notorious Dridex and Locky ransomware have a new target in their sights – large retail, restaurant and grocery chains located in the US. Researchers are warning the well-known financial criminal group TA505 is behind a new wave of email campaigns distributing personalized malware-laced attachments, a technique not previously associated with the...Continue Reading
Hackers have deployed a botnet that’s actively targeting systems running a remote desktop protocol (RDP) connection using a hard-to-detect brute-forcing mechanism. A security researcher has discovered that more than 1.5 million RDP endpoints have so far been compromised by a botnet dubbed GoldBrute and that this figure is only expected to rise. It...Continue Reading
In this day and age, digital aggressors are consistently gaining ground in their hacking apparatuses and systems so as to accomplish a greater vindictive plan. Be that as it may, this does not mean they are for saking the essential instruments, methods, and systems when leading a digital assault. Indeed, a large portion of...Continue Reading
An American IT Giant has fixed a “major” data leak that exposed payment, invoice, account and contact information for the company’s reseller and MSP partners. It wasn’t clear if it’s a hacking incident or malware-related intrusion. The Clearwater, Fla.-based IT distribution giant leaked some 264 gigabytes of client and employee corporate and personal data,...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.