English News

Falcon Complete Stops Microsoft Exchange Server Zero-Day Exploits

Falcon Complete Stops Microsoft Exchange Server Zero-Day Exploits

This week, Microsoft reported a rare cybersecurity event: an ongoing mass exploitation of Microsoft Exchange servers by an alleged state-sponsored adversary, driven through a variety […]
Gootloader Hackers Poison Websites Globally in Order to Infect Business Professionals with Ransomware, Intrusion Tools and Bank Trojans, Warns eSentire

Gootloader Hackers Poison Websites Globally in Order to Infect Business Professionals with Ransomware, Intrusion Tools and Bank Trojans, Warns eSentire

eSentire, a global provider of Managed Detection and Response (MDR) cybersecurity solutions, reported today that the hackers behind the malicious downloader, Gootloader, have poisoned websites […]
Hackers share methods to bypass 3D Secure for payment cards

Hackers share methods to bypass 3D Secure for payment cards

Cybercriminals are constantly exploring and documenting new ways to go around the 3D Secure (3DS) protocol used for authorizing online card transactions. https://www.bleepingcomputer.com/news/security/hackers-share-methods-to-bypass-3d-secure-for-payment-cards/     […]
Ryuk Ransomware Updated With ‚Worm-Like Capabilities‘

Ryuk Ransomware Updated With ‚Worm-Like Capabilities‘

Prolific Ransomware Can ‚Spread Automatically‘ Inside Networks, CERT-FR Warns   https://www.bankinfosecurity.co.uk/ryuk-ransomware-updated-worm-like-capabilities-a-16080       […]
Brand(ed) Lures and GuLoader – The New Face of Email-based Attacks

Brand(ed) Lures and GuLoader – The New Face of Email-based Attacks

After analyzing millions of emails, Cofense researchers have summarized some key patterns used during the attacks in the past year. According to them, cybercriminals are […]
Hackers Using Tricky SEO Technique to Deliver Malware Payloads

Hackers Using Tricky SEO Technique to Deliver Malware Payloads

Cyberattackers are now using a novel attack technique in which they are using Google SEO to deploy malware payloads. This technique takes advantage of human […]
New nation-state cyberattacks

New nation-state cyberattacks

Today, we’re sharing information about a state-sponsored threat actor identified by the Microsoft Threat Intelligence Center (MSTIC) that we are calling Hafnium. Hafnium operates from […]
ENISA and CERT-EU sign Agreement to start their Structured Cooperation

ENISA and CERT-EU sign Agreement to start their Structured Cooperation

The European Union Agency for Cybersecurity (ENISA) and the Computer Emergency Response Team for the EU Institutions, Bodies and Agencies (CERT-EU) are pleased to announce […]
Firewall Vendor Patches Critical Auth Bypass Flaw

Firewall Vendor Patches Critical Auth Bypass Flaw

Cybersecurity firm Genua fixes a critical flaw in its GenuGate High Resistance Firewall, allowing attackers to log in as root users. According to Genua. GenuGate […]
Hackers release a new jailbreak tool for almost every iPhone

Hackers release a new jailbreak tool for almost every iPhone

An iPhone hacking team has released a new jailbreak tool for almost every iPhone, including the most recent models, by using the same vulnerability that […]
Far-Right Platform Gab Has Been Hacked – Including Private Data

Far-Right Platform Gab Has Been Hacked – Including Private Data

The transparency group DDoSecrets says it will make the 70GB of passwords, private posts, and more available to researchers, journalists, and social scientists. https://www.wired.com/story/gab-hack-data-breach-ddosecrets/ https://ddosecrets.com/wiki/GabLeaks […]
China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions

China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions

This report details a campaign conducted by a China-linked threat activity group, RedEcho, targeting the Indian power sector. The activity was identified through a combination […]
NSA Releases Guidance on Zero Trust Security Model

NSA Releases Guidance on Zero Trust Security Model

The National Security Agency (NSA) has released Cybersecurity Information Sheet: Embracing a Zero Trust Security Model, which provides information about, and recommendations for, implementing Zero […]
North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware

North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware

A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the […]
Hypervisor Jackpotting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact

Hypervisor Jackpotting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact

Targeted large-scale ransomware campaigns, referred to as big game hunting (BGH), remained the primary eCrime threat to organizations across all sectors in 2020. The relentless […]
NPower cyber attack – customers warned personal details may have been breached

NPower cyber attack – customers warned personal details may have been breached

The firm, owned by E.ON – one of the UK’s big six energy suppliers – has not revealed how many people may have been affected […]