A Pissed-Off American Hacker Claims He Took down North Korea’s Internet without anyone else

0
Did an annoyed American programmer without any help bring down the web in North Korea? That is the story, as per a new article from Wired. In mid-January, the Hermit Kingdom started...

Tracks of an Iranian hacker covered by a research team revealed his pattern

0
A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the...

If you use this bug ridden software, you can be in serious trouble!

0
A total of 23 new high-severity security flaws have been discovered in various implementations of the Unified Extensible Firmware Interface (UEFI) firmware used by a variety of vendors, including Bull Atos,...
Image Source: ZDNet

Deadly state sponsered attacks on the Palestinian activists

0
Researchers have identified a new wave of offensive cyberattacks aimed at Palestinian activists and entities that began in October 2021 and included politically oriented phishing emails and counterfeit documents. The breaches are...

Shocking New facts about the APT group has come to light

0
Details have emerged concerning a previously unknown malware campaign carried out by the Iranian MuddyWater advanced persistent threat (APT) group, which targeted Turkish commercial companies and government agencies. According to Cisco Talos...

How did Russia-linked hacking, harm Ukranian organization ?

0
Researchers stated on Monday that they discovered evidence of a Russia-linked hacking operation attempting to harm a Ukrainian organization in July 2021. In a new analysis released Monday, Broadcom-owned Symantec blamed the...

This threat actor has been dropping malware by pretending to be someone else

0
To ensure persistence, the PowerShell installer modifies the Windows Registry and drops a.LNK file into Windows' starting directory. This unlawful alteration causes the malware to be loaded from an encrypted payload...

This gang has been evolving it’s methods to attack your system

0
The operators of the SolarMarker information stealer and backdoor have been discovered using subtle ways to create long-term persistence on compromised computers, indicating that threat actors are constantly changing tactics and...

Can we consider Data Breach a boon for some Corporate Brands?

0
Shockingly, information breaks can be really great for a few corporate brands, another review shows. At the point when programmers privateer their far beyond corporate firewalls and expose the private existences of...

The FBI allegedly affirms it tried NSO’s spyware

0
The FBI has affirmed to The Washington Post that the office had a permit to utilize NSO's Pegasus spyware and that it tried out the product's capacities. The agency demands that...