Founder of the World’s Largest Hacker Forums Arrested
The founder of BreachForums made his first court appearance in the Eastern District of Virginia over a criminal complaint arising from his alleged creation and oversight...
NSA Releases Guide to Combat BlackLotus Malware
Malicious cyber actors might exploit a known flaw in Microsoft Windows' secure startup process to bypass Secure Boot protection and run the BlackLotus malware.BlackLotus uses a...
Microsoft Teams Vulnerability Let Attackers Deliver Malware From External Accounts
The latest version of Microsoft Teams had a security flaw uncovered recently by Max Corbridge (@CorbridgeMax) and Tom Ellson (@tde_sec), JUMPSEC's Red Team members.Due...
California Public Employees’ Retirement System Compromised by MOVEit Hackers
CalPERS (California Public Employees’ Retirement Systems) is an organization working to provide pension benefits for retirees and health security services for public servants and...
Hackers Launch Stealthy Password Attacks Using Proxy Services – Microsoft
The threat actor “Midnight Blizzard” is engaging in increasing credential attack activity.They conceal the origin of their assaults by employing residential proxy services.These...
Hackers Attack Linux SSH Servers with Tsunami DDoS Malware
An attack campaign has been recently uncovered by AhnLab ASEC, where poorly controlled Linux SSH servers are targeted and infiltrated with the Tsunami DDoS...
Stealthy SMS Side-Channel Attack Exposes SMS Recipient Location
Stealthy SMS Side-Channel Attack Exposed. When you send an SMS, delivery reports let you know if your message reached the recipient.But here the...
Hackers Attacks on Websites Developed by a Specific Website Development Company
Hackers Attacks on Websites, the websites developed by a certain Korean company, have been the subject of assaults and have been used to spread malware. A...
10 Best Vulnerability Scanner Tools For Penetration Testing – 2023
A Vulnerability Scanner Tool is one of the essential tools in IT departments Since vulnerabilities pop up every day and thus leaving a...
Hackers Use New Exploit Technique to Hijack S3 Buckets
It has been discovered that threat actors might take over expired Amazon S3 buckets to serve rogue binaries without changing the actual modules.Malicious binaries exfiltrate...