Tag: Cyber Attack
Critical MikroTik RouterOS Flaw Exposes 900,000 Systems to Cyber Attacks
MikroTik RouterOS were vulnerable to a privilege escalation vulnerability which was first disclosed in June 2022 at REcon. The vulnerability existed on the x86...
12 Norway Government Ministries were Targeted in a Cyberattack
According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks.The most recent attack was aimed at Norway's public sector,...
North Korean Hacker Group Breached US IT Firm JumpCloud
The cloud-based IT management firm JumpCloud was compromised by North Korean Lazarus Group hackers who appear to be financially motivated to steal cryptocurrencies.Since at...
Sophisticated DDoS Attacks Have Evolved Rapidly; Targeting IT Services
Sophisticated DDoS attacks have become a favored tool for hackers, enabling them to target not only large organizations but also individuals.This means that...
FIN8 Revamped Hacking Toolkit with New Stealthy Attack Features
Syssphinx (aka FIN8) is a financially motivated cyber-crime group deploying revamped sardonic backdoor to deliver Noberus ransomware.This group has been active since January 2016, targeting...
JumpCloud Hacked – Attackers Compromised The Systems Via Spear-phishing Attack
JumpCloud, an American commercial software company, has announced a data breach attributed to a spear phishing attack launched by a sophisticated nation-state-sponsored threat actor.As...
Lazarus APT Group Hijack Windows IIS Servers to Distribute Malware
Threat actors always search for vulnerable devices and networks to gain illicit access and perform malicious activities to accomplish their goals.The APT group, Lazarus,...
Red Menshen APT Group Deploying BPFDoor in Linux Kernel
APTs Red Menshen expands targets to Linux and cloud servers, as seen in ransomware attacks on VMware ESXi, Mirai botnet variations, and cloud-focused stealers...
Jenkins Plugin Flaw Lets Attackers Gain Admin Access
A recent security advisory from Jenkins reported that they had fixed 24 vulnerabilities affecting multiple Jenkins plugins.This Flaw includes 5 High, 18 Medium,...
How To Respond Cyber Incident In your Organization
An incident response plan is very essential for any organization to respond to an incident as quickly as possible. Here we have overviewed how...