Home Search
malicious attacker - search results
If you're not happy with the results, please do another search
New Terrapin Attack Downgrades SSH Protocol Connection Security
SSH protocol is one of the most used protocols across several organizations to establish a remote terminal login and file transfer. SSH consists of...
Hackers are Actively Exploiting Apache Struts 2 Vulnerability
Hackers are taking advantage of a Critical Apache Struts Bug's initial activity with limited IP addresses engaged in exploitation attempts.
Apache is an open-source framework...
Hackers Abuse OAuth Applications to Launch Automated Financial Attacks
OAuth (Open Authorization) is an industry-standard protocol that allows third-party applications to access a user's data without exposing login credentials.
This standard protocol facilitates secure...
Hackers Planting Credit Card Skimmers Inside Google Tag Manager Scripts
Recently, it has been reported that Magecart Veteran ATMZOW has found 40 new domains of Google Tag Manager. As a result, thousands of websites...
New 5Ghoul Attack Impacts 5G Devices From Popular Brands
5G is the 5th generation mobile network, and this technology has significantly revolutionized communication by offering:-
Faster internet speeds
Reduced latency
Increased connectivity
Besides this, 5G offers low-latency...
New iPhone Hack Convinces Users With Fake Lockdown Mode
A post-exploitation tampering technique has been discovered that allows the malware to visually trick the user into thinking their iPhone is in Lockdown Mode.
While...
5 Best Ways a Malware Sandbox Can Help Your Company – Threat Analysis Guide...
Malware sandboxes are indispensable for threat analysis, but many of their capabilities are often overlooked. On a closer look, they offer a surprising array...
Secure Your CI/CD Pipeline with Secret Management Best Practices
CI/CD pipelines require a number of permissions to function, and they handle infrastructure and application secrets in most organizations. As a result, whoever manages...
Threat Actors Exploit Adobe ColdFusion Flaw to Hack Government Servers
A recent cybersecurity advisory from CISA has brought to light a formidable cyber onslaught, revealing an alarming breach where faceless hackers capitalized on a...
Hackers Exploiting Crypto Liquidity Pools to Execute Profitable Trades
Crypto pool liquidity is the total assets locked in a decentralized finance (DeFi) liquidity pool.
Hackers manipulate the pool liquidity to create artificial imbalances that...