Cloudflare’s Server Hacked Using Leaked Access Token in Okta Breach
Cloudflare discovered a threat actor on the self-hosted Atlassian server on November 23, 2023. The attack was launched with the use of one stolen access token and three compromised service account credentials that were neglected...
Russian APTs Employ HTTP-Shell to Attack Government Entities
Recently, Cluster25, a threat intelligence firm, uncovered a spear-phishing campaign dubbed "The Bear and the Shell," specifically targeting entities critical of the Russian government and aligned with dissident movements.
The campaign leverages social engineering tactics,...
Hackers Use Compromised Routers to Attack Government Organizations
Attackers continue to use compromised routers as malicious infrastructure to target government organizations in Europe and the Caucasus region.
APT28 threat actors (also known as Sofacy, Fancy Bear, etc.) were behind this malicious espionage effort, according to...
Blackwood APT Hackers Use DLL Loader to Escalate privilege & Install backdoor
The recent discovery of a new DLL loader associated with the notorious Blackwood APT group has sent shivers down the spines of cybersecurity professionals.
This sophisticated malware, analyzed by SonicWall Capture Labs, targets unsuspecting users...
Researchers Awarded Over $1 Million in Pwn2Own Hacking Competition
At Pwn2Own Automotive 2024 Day 2, researchers were rewarded over $1 million for exploiting Tesla infotainment systems, Sony, Alphine players, Autel charging systems, and much more.
On the first day, a prize of $722,500 was given to researchers...
HP Hacked by Russian ‘Cozy Bear’ Hacker Group
On December 12, 2023, Hewlett Packard Enterprise (HPE) received chilling news: the notorious nation-state actor Midnight Blizzard, also known as Cozy Bear, had breached its cloud-based email environment.
This audacious cyber espionage campaign sent shockwaves...
Iranian Mint Sandstorm Attacking Researchers With New Hacking Tools
Hackers frequently target researchers to get illegal access to important research data, intellectual property, and highly sensitive information.
The threat actors can exploit this information for various illicit purposes like economic espionage, competitive advantage, or...
22-yr Old Hacker from ShinyHunters Group Arrested for Hacking 60+ Organizations
A 22-year-old French citizen, Sebastian Raoult, has been sentenced to three years in prison and ordered to pay over $5 million in restitution for his role in a sprawling cybercrime ring that hacked and...
Microsoft Disabled App Installer that Abused by Hackers to Install Malware
Threat actors, particularly those with financial motivations, have been observed spreading malware via the ms-appinstaller URI scheme (App Installer). As a result of this activity, Microsoft has disabled the ms-appinstaller protocol handler by default.
“The...
Hackers’ Leaksmas Darkweb Event Exposes Massive Hacked Data
As carols resonated in the air and families convened, the cyber underworld ushered in a chilling twist to Christmas – 'Leaksmas,' a season marked by rampant data dumps targeting individuals and organizations worldwide.
Resecurity, a...