Category: hacking attacks

“Unraveling the CPU Threat Trio: An Insight into Collide+Power, Downfall, & Inception Side-Channel Attacks”

“Unraveling the CPU Threat Trio: An Insight into Collide+Power, Downfall, & Inception Side-Channel Attacks”

Breaking down the CPU Calamity: A Trio of Side-Channel Attacks Main Points: Cybersecurity researchers reveal details about three side-channel attacks. The attacks are named Collide+Power (CVE-2023-20583), Downfall (CVE-2022-40982), and Inception (CVE-2023-20569). These attacks follow a previously disclosed AMD’s Zen 2 architecture-based processors vulnerability. Cybersecurity Researchers Lift the Lid on CPU Vulnerability Trio So it seems,

Read More
“Unmasking RedHotel: Global Cyber Threats Linked to China’s MSS Hackers”

“Unmasking RedHotel: Global Cyber Threats Linked to China’s MSS Hackers”

Main Bullets: Chinese hackers linked with Ministry of State Security (MSS) were held responsible for cyber-attacks in 17 countries spread across Asia, Europe, and North America during the span from 2021 to 2023. The cybersecurity firm Recorded Future attributed the cyber incursions to RedHotel, previously known as Threat Activity Group-22 (TAG-222). This group’s activities broadly

Read More
“Unveiling the Stealthy Cyber Attack on UK Electoral Commission: A Data Breach Affecting 40 Million Voters”

“Unveiling the Stealthy Cyber Attack on UK Electoral Commission: A Data Breach Affecting 40 Million Voters”

UK Electoral Commission Experiences Stealthy Cyber Attack Main Points: The UK Electoral Commission disclosed a “complex” cyber attack on its systems. The hack went undetected for over a year, giving hackers access to data of approximately 40 million voters. Incident identified in October 2022 due to suspicious activity detected on the systems. Hostile actors had

Read More
Exploring Cybersecurity: How Exposed Kubernetes Clusters Become Cryptojacking Playgrounds for Malicious Actors

Exploring Cybersecurity: How Exposed Kubernetes Clusters Become Cryptojacking Playgrounds for Malicious Actors

Malicious Actors Exploit Exposed Kubernetes Clusters for Cryptojacking and More Main Talking Points: Unsecured Kubernetes (K8s) clusters are exploited by malicious entities for cryptocurrency mining and installing backdoors. Aqua, a cloud security company, revealed a majority of the compromised clusters belong to small to medium enterprises across various sectors. About the Exploited Kubernetes Clusters If

Read More
“Enhancing Security: Google’s New Features with Android 14 for a Safer Digital Space”

“Enhancing Security: Google’s New Features with Android 14 for a Safer Digital Space”

Google Adds Extra Layer of Security with New Feature on Android 14 Google introduces a fresh security trait in Android 14 for IT administrators to neutralize 2G cellular networks in managed devices. Another user configuration is integrated to cease support for null-ciphered cellular connections at the model level. The Android Security Model runs on the

Read More
“August 2023 Patch Tuesday: Microsoft Tackles 74 Software Flaws & Bolsters Application Security”

“August 2023 Patch Tuesday: Microsoft Tackles 74 Software Flaws & Bolsters Application Security”

Microsoft Sews Up 74 Software Flaws Microsoft has successfully patched a total of 74 software vulnerabilities as part of the latest Patch Tuesday updates for August 2023. The company fixed significantly fewer flaws this month, down from a whopping 132 the previous month. The patch addresses six Critical and 67 Important security vulnerabilities. In addition,

Read More
“Unmasking QakBot: The Rise in Malware Command-and-Control Servers”

“Unmasking QakBot: The Rise in Malware Command-and-Control Servers”

QakBot Operators Spice up Malware Scene with New Command-and-Control Servers Main Points: QakBot (QBot) malware operators have created 15 new command-and-control (C2) servers since June 2023. This insight resulted from Team Cymru’s continual analysis of the malware’s infrastructure. This follows the findings of Lumen Black Lotus Labs, which revealed that 25% of C2 servers operate

Read More
“Cloudflare Tunnels: The New Cybersecurity Threat in Cloud-Based Communication”

“Cloudflare Tunnels: The New Cybersecurity Threat in Cloud-Based Communication”

Cloud-Based Communication: Hacker’s New Preferred Tool Threat actors are exploiting Cloudflare Tunnels to establish covert communication and maintain persistent access. Cloudflared, functionally similar to ngrok, is preferred due to its higher usability for free. Nic Finn, a senior threat intelligence analyst at GuidePoint Security, highlighted this issue. Threat Actors Going Underground with Cloudflare Tunnels New

Read More
From Active Directory to Azure: The Evolution of Microsoft’s Identity and Access Management

From Active Directory to Azure: The Evolution of Microsoft’s Identity and Access Management

**Main Points** – Introduction of Microsoft Active Directory in 1999 as a default identity and access management service in Windows networks. – Microsoft Active Directory is responsible for assigning and enforcing security policies across networks and enabling access to resources. – The emergence of new-age technology, prompting Microsoft to introduce Azure Active Directory a few

Read More
“Unmasking the Unknown: Exploring the New Yashma Ransomware Variant and Its Global Impact”

“Unmasking the Unknown: Exploring the New Yashma Ransomware Variant and Its Global Impact”

Unknown Threat Actor Wields New Yashma Ransomware Variant Main Points: An unknown threat actor is using a new variant of the Yashma ransomware. The operation has been active at least since June 4, 2023. The targets are varied, spanning English-speaking countries, Bulgaria, China, and Vietnam. Cisco Talos links the operation with moderate confidence to a

Read More
0

Your Cart Is Empty

No products in the cart.