Authorities Shut Down 27 DDoS-for-Hire Platforms, Arrest 3 Admins
SUMMARY Global Dismantling of DDoS Platforms: Law enforcement from 15 countries shut down 27 websites offering DDoS attack services as part of Operation PowerOFF. Arrests…
SUMMARY Global Dismantling of DDoS Platforms: Law enforcement from 15 countries shut down 27 websites offering DDoS attack services as part of Operation PowerOFF. Arrests…
SUMMARY: Researchers found a rise in phishing attacks in the UAE impersonating Dubai Police via SMS. Attackers use fake domains with typosquatting and suspicious extensions…
You are not alone, ChatGPT and Sora AI are down worldwide. OpenAI says it is aware of the issue and working on a fix. ChatGPT,…
The rise of social media and digital communication has transformed how we connect, but it has also opened the door to cybercrime and harmful behaviours,…
SUMMARY Cyberattack Reported: Krispy Kreme faced a cyberattack on November 29, 2024, disrupting online orders in the U.S. Operations Impact: In-store sales and deliveries remained…
SUMMARY Dubbed AuthQuake; the flaw in Microsoft MFA allowed attackers to bypass security measures and access accounts. Vulnerability impacted Azure, Office 365, and other Microsoft…
SUMMARY A sophisticated phishing campaign is targeting employees of 30+ companies across 12 industries worldwide. Over 200 malicious links have been distributed, designed to steal…
SUMMARY The new DCOM attack leverages Windows Installer service for stealthy backdoor deployment. Attack exploits the IMsiServer interface for remote code execution and persistence. Malicious…
SUMMARY Black Basta Campaign Resurgence: Rapid7 researchers report a sophisticated social engineering campaign by the Black Basta ransomware group, refining tactics and targeting organizations globally.…
SUMMARY: Critical Vulnerability Alert: Dell Power Manager versions before 3.17 have a high-severity access control flaw (CVE-2024-49600) allowing attackers to gain elevated privileges. Exploitation Risk:…
SUMMARY AppLite Trojan: A new, stealthy banking trojan targeting Android devices, capable of stealing banking credentials, crypto wallets, and sensitive data. Phishing Campaign: Delivered via…
The Digital Operational Resilience Act (DORA) sets strict EU rules for financial institutions and IT providers, emphasizing strong cyber risk management, reporting, red teaming, and…