Home Search
DDoS - search results
If you're not happy with the results, please do another search
Hackers Exploiting 0-day RCE Flaws in the Wild to Deploy Mirai Malware
The Mirai botnet is a malicious network of infected computers, routers, and IoT devices harnessed by cybercriminals to launch large-scale DDoS attacks.
The destructiveness of...
Microsoft Defender Bounty Program: Rewards up to $20,000 USD
Microsoft has launched the Defender Bounty Program, which aims to improve the security of its customers' experience by incentivizing researchers with rewards of up...
Rhysida Ransomware Attacking Windows Machine Through VPN Devices and RDP
Rhysida, a new ransomware group, hit its first victim in May 2023. They use their ransomware, offered as RaaS (Ransomware-as-a-Service), with at least 50...
CISA Releases Cyber Attack Mitigation for Healthcare Organizations
In an era marked by persistent cyber threats, the Cybersecurity and Infrastructure Security Agency (CISA) has released a cyber attack Mitigation Guide specifically tailored...
LummaC2 Employs Trigonometry to Track Mouse Movements
MaaS (Malware-as-a-Service) thrives as a top choice for new cyber threats, offering easy access to powerful tools. Threat actors primarily focus on information theft...
Hackers Attacking Apache Web Servers to Install Coinminers
An attack campaign that installs XMRig Coinminer on Windows web servers that run on Apache has been discovered recently. The threat actors used the...
Nessus Vulnerability Let Attackers Alter Rules Variables
An arbitrary file write vulnerability has been discovered in Nessus, which allows an authenticated, remote attacker to perform a denial of service condition on...
Hackers Infect Linux Machines with Rootkits via Apache ActiveMQ Vulnerability
Apache ActiveMQ is a Java-based open-source protocol that allows distributed applications to exchange messages.
It uses the JMS API to provide a dependable messaging platform...
LitterDrifter Powershell Worm Rapidly Spreads on USB Drives by Itself
Gamaredon (aka Primitive Bear, ACTINIUM, and Shuckworm) stands out in Russian espionage by exclusively targeting Ukrainian entities. Unusually evident, it challenges researchers seeking evidence...
Splunk RCE Vulnerability Let Attackers Upload Malicious File
A high-severity Remote Code Execution (RCE) flaw in Splunk Enterprise has been discovered, enabling an attacker to upload malicious files.
Versions of Splunk Enterprise less than...