US Crackdown With Microsoft: Over 100 Russian Domains Seized
In the most recent US crackdown with Microsoft a total of 107 Russian domains have been seized. Reports claim that these domains were mainly used by state sponsored threat actors for malicious purposes. In this article, we’ll dive into the details of the US crackdown, the threat actor behind the ... Read More
Largest DDoS Cloudflare Attack On Global Sectors Mitigated
As per recent media reports, Cloudflare has successfully disclosed the mitigation of a record-breaking distributed denial-of-service (DDoS) attack. The DDoS Cloudflare attack, at its peak, was 3.8 terabits per seconds (Tbps) and had a duration of around 65 seconds. In this article, we’ll dive into the details of the attack ... Read More
LiteSpeed Plugin Flaw: WordPress Users Exposed To XSS Attack
As per recent reports, a new LiteSpeed plugin flaw has been discovered and WordPress users are now at risk of cross-site scripting (XSS) attacks. The flaw if exploited allows threat actors to execute arbitrary JavaScript code to carry out their malicious intentions. In this article, we’ll cover what this flaw ... Read More
North Korean Hackers Use New Backdoor And RAT For Attacks
As per recent reports, North Korean hackers have been observed using a new backdoor and remote access trojan as part of their attack campaign. VeilShell, the new tool, is primarily being used to target Southeast Asian countries. In this article, we’ll dive into the details and uncover how such attacks ... Read More
Google Pixel Security: New Features For Enhanced Protection
Google Pixel security was becoming a key concern due to the increasing threat of baseband attacks. In light of such attacks, Google has revealed multiple security guardrails to keep Pixel devices from being compromised. In this article, we’ll dive into the details of the updated Google Pixel security and uncover ... Read More
Cloud Ransomware Attack: Microsoft Sees Storm-0501 As Threat
Microsoft has recently identified a threat actor known as Storm-0501 targeting government, manufacturing, transportation, and law enforcement sectors in the United States (US) in a cloud ransomware attack campaign. In this article, we’ll dive into the details of the campaign and determine how such attacks are carried out. Let’s begin! ... Read More
Threat Actors Exploit NVIDIA Vulnerability For Host Access?
As per recent reports, a critical NVIDIA vulnerability pertaining to its Container Toolkit has been discovered. If the container security vulnerability were to be exploited by threat actors, it could allow them to have access to the underlying host. In this article, we’ll look at how severe the vulnerability is ... Read More
Two Crypto Exchanges Face US Sanctions For Money Laundering
Recent media reports have shed light on the US sanctions that were imposed on two crypto exchanges. In addition, the government also issued an indictment against a Russian national who was involved in money laundering crimes. In this article we’ll dive into the details of the sanctions and determine what ... Read More
Indian Threat Actors Target South And East Asian Entities
Recent reports have revealed that Indian threat actors are using multiple cloud service providers for malicious purposes. The hacker activities are mainly centered around facilitating credential harvesting, malware delivery, and command-and-control (C2). In this article, we’ll cover who the Indian threat actor is targeting and what the attack chain looks ... Read More
Chinese APT Group Infiltrates US ISPs In Attack Campaign
As per recent media reports, a Chinese APT group has been observed targeting multiple United States (US) Internet Service Providers (ISPs) as part of an attack campaign. The primary aim of such attacks is to acquire sensitive information. In this article, we’ll dive into the details of the ISP cyber ... Read More