Volumetric DDoS attack peaks at 3.7Tbps, largest in public record
03
Oct
2024

Cloudflare blocks largest recorded DDoS attack peaking at 3.8Tbps

During a distributed denial-of-service campaign targeting organizations in the financial services, internet, and telecommunications sectors, volumetric attacks peaked at 3.8…

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP
03
Oct
2024

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP

An exclusive live webinar will take place on October 4th at noon Eastern Time (ET), demonstrating how Criminal IP’s Attack…

Russian hackers
03
Oct
2024

Microsoft and DOJ disrupt Russian FSB hackers’ attack infrastructure

Microsoft and the Justice Department have seized over 100 domains used by the Russian ColdRiver hacking group to target United…

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions
03
Oct
2024

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions

At DEF CON 32, the SquareX research team delivered a hard-hitting presentation titled Sneaky Extensions: The MV3 Escape Artists where…

New Linux Malware 'Perfctl' Targets Millions by Mimicking System Files
03
Oct
2024

New Linux Malware ‘Perfctl’ Targets Millions by Mimicking System Files

New Linux malware ‘Perfctl’ is targeting millions worldwide, mimicking system files to evade detection. This sophisticated malware compromises Linux servers,…

2G Exploits and Baseband Attacks
03
Oct
2024

Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks

Oct 03, 2024Ravie LakshmananMobile Security / Technology Google has revealed the various security guardrails that have been incorporated into its…

Over 4,000 Adobe Commerce, Magento shops hacked in CosmicSting attacks
03
Oct
2024

Over 4,000 Adobe Commerce, Magento shops hacked in CosmicSting attacks

Adobe Commerce and Magento online stores are being targeted in “CosmicSting” attacks at an alarming rate, with threat actors hacking approximately…

How To Collect Malware Indicators Of Compromise In The ANY.RUN Sandbox
03
Oct
2024

How To Collect Malware Indicators Of Compromise In The ANY.RUN Sandbox

Indicators of Compromise (IOCs) are critical forensic artifacts that cybersecurity researchers use to “detect,” “investigate,” and “mitigate” security threats. As…

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP
03
Oct
2024

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP

Decoding Compliance | What CISOs Need to Know Non-compliance can result in substantial financial penalties, with average fines reaching up…

Apple
03
Oct
2024

Fraudsters imprisoned for scamming Apple out of 6,000 iPhones

Two Chinese nationals were sentenced to prison for scamming Apple out of more than $2.5 million after exchanging over 6,000…

Telegram API to Intercept Data Exfiltrated by Malware
03
Oct
2024

How Analysts Use Telegram API to Intercept Data Exfiltrated by Malware

Threat actors are increasingly relying on Telegram and Discord apps for data exfiltration. Analysts at ANY.RUN shared a detailed guide…

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions
03
Oct
2024

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions

At DEF CON 32, the SquareX research team delivered a hard-hitting presentation titled Sneaky Extensions: The MV3 Escape Artists where…