MuddyWater Hackers Abusing Legitimate RMM Tool to Deliver Malware
26
Apr
2024

MuddyWater Hackers Abusing RMM Tool to Deliver Malware

The Iranian state-sponsored threat actor MuddyWater has been observed exploiting a legitimate remote monitoring and management (RMM) tool, Atera Agent,…

Microsoft Publicly Releases MS-DOS 4.0 Source Code
26
Apr
2024

Microsoft Publicly Releases MS-DOS 4.0 Source Code

In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…

Google Facebook ads are deceptive and information stealing
26
Apr
2024

Google Facebook ads are deceptive and information stealing

Facebook users need to be on high alert as a new phishing scam has emerged, disguising itself as a website…

Sweden’s liquor supply severely impacted by ransomware attack
26
Apr
2024

Sweden’s liquor supply severely impacted by ransomware attack

Sweden’s liquor supply severely impacted by ransomware attack on logistics company Pierluigi Paganini April 26, 2024 A ransomware attack on…

Hackers Actively Exploiting WP Automatic Updates Plugin Flaw
26
Apr
2024

Hackers Actively Exploiting WP Automatic Updates Plugin Flaw

Hackers often target WordPress plugins as they have security loopholes that they can exploit to hack into sites without permission. …

New SSLoad Malware Combined With Tool Take Control Of Entire Network Domain
26
Apr
2024

New SSLoad Malware Combined With Tool Take Control Of Entire Network Domain

A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…

Difference between Whale Phishing and Spear Phishing
26
Apr
2024

Navigating the Rising Tide of Cyber Attacks: Lessons from recent Cyber Incidents

In recent weeks, two high-profile cyber attacks have shaken industries across the globe, under-scoring the ever-present threat posed by malicious…

WP-Automatic Plugin Bug
26
Apr
2024

Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites

Apr 26, 2024NewsroomThreat Intelligence / Cyber Attack Threat actors are attempting to actively exploit a critical security flaw in the…

CISA Launches Ransomware Vulnerability Warning Pilot
26
Apr
2024

CISA Launches Ransomware Vulnerability Warning Pilot

In response to this growing threat, the Cybersecurity and Infrastructure Security Agency (CISA) has launched the Ransomware Vulnerability Warning Pilot…

SpaceX Data Breach
26
Apr
2024

Old SpaceX Data Breach Back In Spotlight

SpaceX, the aerospace manufacturer and space transport services company founded by Elon Musk, has allegedly met with a cybersecurity incident,…

PoC Exploit Released For Critical Flowmon Vulnerability
26
Apr
2024

PoC Exploit Released For Critical Flowmon Vulnerability

Progress addressed a critical vulnerability last week, which was associated with an unauthenticated Command injection on the Progress Flowmon product….

Cyber Attack Defenders Up For Battle
26
Apr
2024

Palo Alto Networks Shares Remediation Advice for Hacked Firewall

Palo Alto Networks has issued urgent remediation advice after discovering a critical vulnerability, designated CVE-2024-3400, which threat actors have exploited…