SAPwned Vulnerability Attack Let Hackers Gain Control to Users Cloud Environments
Multiple vulnerabilities in SAP AI Core had been identified, giving malicious actors access to customer data and the ability to take control of the service.
With SAP AI Core, users may leverage the company's extensive...
Tools Used By NullBulge Actor, Who Released Disney’s Internal Slack Communications
Hackers often target internal communications tools to obtain confidential information like employee records, business plans, and proprietary technologies.
With these characteristics of trust and openness, internal communications provide valuable but less secure means for cyber-attacks...
Hackers Attacking Windows Users With Internet Explorer Zero-Day Vulnerability
Hackers target legitimate Remote Monitoring and Management (RMM) tools as they provide powerful, trusted access to systems and networks.
This can facilitate the widespread and efficient deployment of malware across an organization's infrastructure.
Cybersecurity researchers at...
CRYSTALRAY Hackers Exploiting Popular pentesting Tools To Evade Detections
The threat actor Crystalray, previously observed using SSH-Snake, has significantly expanded operations, targeting over 1,500 victims.
Employing mass scanning, exploiting multiple vulnerabilities, and utilizing tools like zmap, asn, httpx, nuclei, platypus, and SSH-Snake, CRYSTALRAY aims...
OilAlpha Hacker Group Attacking Humanitarian & Human Rights Organizations
A pro-Houthi group, OilAlpha, is targeting humanitarian organizations in Yemen with malicious Android applications by stealing credentials and gathering intelligence, potentially disrupting aid distribution.
The applications target sensitive data and require invasive permissions, such as...
Hackers Weaponizing Shortcut Files With Zero-day Tricks To Attack Windows Users
Hackers weaponize shortcut files because they are an inconspicuous way to execute malicious code on a target system.
These files can be disguised as harmless icons but actually contain commands that, when clicked, launch harmful...
Fujitsu Cyber Attack: Customers’ Personal Information Exposed
Fujitsu Limited has disclosed the results of an investigation into a cyberattack that potentially exposed customers' personal information.
The breach, first announced on March 15, 2024, was caused by sophisticated malware that infiltrated the company's...
Kimsuky Hackers Attacking Organizations Using Weaponized EXE & DOCX Files
Hackers often use EXE and DOCX file formats is due to they are among the most commonly used types of files that can be easily disguised as legitimate.
EXE files can be used to deliver...
Teamviewer Discloses Investigation Update Following Cyber Attack
TeamViewer, the global leader in remote connectivity solutions, has provided an update on the cyber attack detected on June 26, 2024.
The company has concluded the main incident response and investigation phase, confirming that...
Team ARXU Hackers Aggressively Attacking Schools And Bank Servers
Hackers frequently target schools and bank servers to obtain important personal information, including financial data, that can be used for identity theft and financial fraud. These data are also being sold on the dark...