Category: CyberSecurityNews

Russian APT’s Employ HTTP-Shell to Attack Government Entities
01
Feb
2024

Russian APT’s Employ HTTP-Shell to Attack Government Entities

Recently, Cluster25, a threat intelligence firm, uncovered a spear-phishing campaign dubbed “The Bear and the Shell,” specifically targeting entities critical…

Hackers Use Compromised Routers to Attack Government Organizations
01
Feb
2024

Hackers Use Compromised Routers to Attack Government Organizations

Attackers continue to use compromised routers as malicious infrastructure to target government organizations in Europe and the Caucasus region. APT28…

Next-Generation Malware Analysis With Sandboxing
31
Jan
2024

Next-Generation Malware Analysis With Sandboxing

With the increasing complexity and sophistication of malware, traditional signature-based detection technologies are insufficient. Next-generation malware analysis is a significant…

Hackers Exploit Open Redirect Flaws for Phishing Attacks
31
Jan
2024

Hackers Exploit Open Redirect Flaws for Phishing Attacks

Attackers abuse trustworthy platforms for redirection, which involves the use of legitimate websites to redirect users to harmful URL destinations. In…

Aembit Announces New Workload IAM Integration with CrowdStrike
30
Jan
2024

Aembit Announces New Workload IAM Integration with CrowdStrike

Aembit Becomes the First Workload IAM Platform to Integrate with the Industry-Leading CrowdStrike Falcon Platform to Drive Workload Conditional Access…

How to Check an Email for Viruses in a Sandbox
30
Jan
2024

How to Check an Email for Viruses in a Sandbox

Funny videos, messages on social networks, hot topic news, and special offers are perfect baits for stealing your money and…

Blackwood APT Hackers Use DLL Loader to Escalate Privileges
30
Jan
2024

Blackwood APT Hackers Use DLL Loader to Escalate Privileges

The recent discovery of a new DLL loader associated with the notorious Blackwood APT group has sent shivers down the…

Hundreds Of Network Operators’ Credentials Exposed on Dark Web
30
Jan
2024

Hundreds Of Network Operators’ Credentials Exposed on Dark Web

A recent cyberattack on Orange España highlights the vulnerability of telecom network personnel and the critical need for improved digital…

Linux Kernel’s IPv6 Implementation Flaw
30
Jan
2024

Linux Kernel’s IPv6 Implementation Flaw

With a CVSS score of 7.5, a high-severity IPv6 implementation issue in the Linux kernel identified as CVE-2023-6200 allowed attackers…

Democratizing Cybersecurity for Organizations of All Sizes
29
Jan
2024

Democratizing Cybersecurity for Organizations of All Sizes

In an era where online threats no longer discriminate by business size, Control D, powered by Windscribe VPN‘s robust security…

Russian Hackers Who Hacked Microsoft Also Targeted Other Organizations
29
Jan
2024

Russian Hackers Who Hacked Microsoft Also Targeted Other Organizations

On January 12, 2024, Microsoft identified a nation-state threat actor, “Midnight Blizzard,” attacking their corporate systems. Upon discovery, Microsoft deployed…

How Phishing Undermines Business Security
28
Jan
2024

How Phishing Undermines Business Security

In an era where technology intertwines intricately with every facet of business operations, cybersecurity emerges as a buzzword and a…