Moses staff hacker group using new StrifeWater RAT for ransomware attacks
A hacker group called Moses Staff is incorporating an undocumented Remote Access Trojan (RAT) that disguises as a Windows Calculator App to go stealth.
A hacker group called Moses Staff is incorporating an undocumented Remote Access Trojan (RAT) that disguises as a Windows Calculator App to go stealth.
Multiple security vulnerabilities have been disclosed in 42 Gears SureMDM solution. It is a mobile device management solution that can be manipulated by threat actors to execute supply chain attacks.
A new fingerprinting technique is exploiting a device’s graphics processing unit (GPU) that can track users activity on the web persistently. This technique is called as DrawnApart, and identifies as a device from the unique properties of the the GPU.
A German Court from Munich has ordered a website owner to pay a penalty of €100 for migrating personal data of users. The owner has leveraged the IP address of the users via Google Fonts library without the user’s consent.
A framework that is used for developing, implementing, monitoring, and improving IT governance is called as COBIT (Control Objectives for Information and Related Technology)
Security researchers at Cyble have identified more than 20,000 instances of data centers that are exposed publicly and could cause catastrophic results if breached by hackers.
The United States under Biden’s command will initiate a new agenda to protect the country’s water sector against cyberattacks, which comes besides their security hardening protocols undertaken recently.
REvil ransomware is a malware that encrypts victims data and asks for a ransom just like any other ransomware. The threat usually asks the ransom in bitcoin that needs to be paid in a limited time if not the ransom amount will continue to rise.
Security researchers from Kaspersky have discovered a novel bootkit that can infect UEFI firmware in a computer. This malware is found to be a novel one, can be troublesome if compromises your network devices.
Microsoft disclosed details of a new security vulnerability with SolarWinds Serv-U software that is found to be leveraged by threat actors to launch attacks by exploiting the Log4j flaws to breach networks.
Our vision is to deliver the trending and happening cyber events to the enthusiasts.
We believe in delivering educational and quality content for hassle-free understanding of the subject.
You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.