Home Search
HTTPS - search results
If you're not happy with the results, please do another search
Chinese Hackers Employed DNS-over-HTTPS for Linux Malware Communication
ChamelGang, a sophisticated threat actor believed to be based in China, has been using different tools for intrusions, as identified by the security researchers...
Billbug – APT Hackers Group Attack Digital Cert Authority to Intercept The HTTPS...
Researchers uncovered that State-Sponsors APT hackers called "Billbug" attacked and compromise the digital certificate authority in multiple Asian countries along with other government and...
Largest HTTPS DDOS Attack Recorded By Google with 46 Million Requests Per Second
It was reported that Google has been targeted with the largest DDoS attack in history against one of its customers. An attack on one...
Largest HTTPS DDoS Attack on Record – 26 million Request per Second
Recently, Cloudflare noticed and mitigated a 26 million request per second DDoS attack, the largest HTTPS DDoS attack on record. This attack targeted customer...
DeathStalker APT Hackers Launch PowerPepper Malware That Leveraged DNS over HTTPS as a C2...
Researchers have recently detected a new malware "PowerPepper" activity from DeathStalker. It is the advanced persistent threat (APT) actor, recognized for contributing hacking-for-hire services.
The...
Firefox 73 Released – Added NextDNS in Firefox DNS over HTTPS & Several...
Mozilla released Firefox 73 with several security patch updates for the vulnerabilities that affected the previous version of Firefox.
Firefox 73 addressed and fixed 6...
GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To...
GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report that highlights the growing, widespread use and potential of Web3 user...
C2A Security’s EVSec Risk Management and Automation Platform Gains Automotive Industry Favor as Companies...
In 2023, C2A Security added multiple OEMs and Tier 1s to its portfolio of customers, successful evaluations, and partnerships such as BMW Group, Daimler...
Apple ID “push bombing” Attack Targeting Apple Users to Steal passwords
Apple users are falling prey to a sophisticated phishing campaign designed to hijack their Apple IDs through what's known as a “push bombing” or...
Hackers Using Weaponized Virtual Hard Disk Files to Deliver Remcos RAT
Hackers have been found leveraging weaponized virtual hard disk (VHD) files to deploy the notorious Remote Control Software (RAT), Remcos.
This method marks a...