SIEM as a Service
Home Search

malicious attacker - search results

If you're not happy with the results, please do another search
New Terrapin Attack Downgrades SSH Protocol Connection Security

New Terrapin Attack Downgrades SSH Protocol Connection Security

SSH protocol is one of the most used protocols across several organizations to establish a remote terminal login and file transfer. SSH consists of...
Hackers are Actively Exploiting Apache Struts 2 Vulnerability

Hackers are Actively Exploiting Apache Struts 2 Vulnerability

Hackers are taking advantage of a Critical Apache Struts Bug's initial activity with limited IP addresses engaged in exploitation attempts. Apache is an open-source framework...
Hackers Abuse OAuth Applications to Launch Automated Finacial Attacks

Hackers Abuse OAuth Applications to Launch Automated Financial Attacks

OAuth (Open Authorization) is an industry-standard protocol that allows third-party applications to access a user's data without exposing login credentials.  This standard protocol facilitates secure...
Hackers Planting credit card skimmers inside Google Tag Manager scripts

Hackers Planting Credit Card Skimmers Inside Google Tag Manager Scripts

Recently, it has been reported that Magecart Veteran ATMZOW has found 40 new domains of Google Tag Manager. As a result, thousands of websites...
New 5Ghoul Attack Impacts 5G Devices From Popular Brands

New 5Ghoul Attack Impacts 5G Devices From Popular Brands

5G is the 5th generation mobile network, and this technology has significantly revolutionized communication by offering:- Faster internet speeds Reduced latency Increased connectivity  Besides this, 5G offers low-latency...
New iPhone Hack Lockdown Mode

New iPhone Hack Convinces Users With Fake Lockdown Mode

A post-exploitation tampering technique has been discovered that allows the malware to visually trick the user into thinking their iPhone is in Lockdown Mode. While...
5 Best Ways a Malware Sandbox Can Help Your Company – Threat Analysis Guide 2024

5 Best Ways a Malware Sandbox Can Help Your Company – Threat Analysis Guide...

Malware sandboxes are indispensable for threat analysis, but many of their capabilities are often overlooked. On a closer look, they offer a surprising array...
Secure Your CI/CD Pipeline with Secret Management Best Practices

Secure Your CI/CD Pipeline with Secret Management Best Practices

CI/CD pipelines require a number of permissions to function, and they handle infrastructure and application secrets in most organizations. As a result, whoever manages...
Threat Actors Exploit Adobe ColdFusion Flaw to Hack Government Servers

Threat Actors Exploit Adobe ColdFusion Flaw to Hack Government Servers

A recent cybersecurity advisory from CISA has brought to light a formidable cyber onslaught, revealing an alarming breach where faceless hackers capitalized on a...
Hackers Crypto Liquidity Pools

Hackers Exploiting Crypto Liquidity Pools to Execute Profitable Trades

Crypto pool liquidity is the total assets locked in a decentralized finance (DeFi) liquidity pool. Hackers manipulate the pool liquidity to create artificial imbalances that...
SIEM as a Service

Recent Posts

RedExt Chrome Extension Tool

New RedExt Chrome Extension Tool for Red Teamers with Flask-based C2...

A sophisticated new red team tool called RedExt has recently been released, combining a Manifest V3 Chrome extension with a Flask-based Command and Control...