Category: Technobabble

North Korean hackers infiltrate individuals and corporations using sophisticated hacking attacks
North Korean hackers are notorious for infiltrating individuals and corporations through sophisticated hacking attacks. The German Federal Office for the Protection of the Constitution and the National Intelligence Service of the Republic of Korea (NIS) have issued a statement that...

Resolving prioritization issues faced by modern AppSec teams with EASM
The post Resolving prioritization issues faced by modern AppSec teams with EASM appeared first on Detectify Blog.

DDoS Attack From Killnet Threat Group Frustrated By The US Treasury
Posted on November 5, 2022 at 6:02 AM The US Treasury Department stated recently that it blocked a distributed denial of service (DDoS) attack linked to the Russian hacktivist group Killnet. The same group claimed responsibility for hitting on over...

Misconfigured Windows Servers Are Contributing To DDoS Attacks, Researchers Warn
Posted on November 3, 2022 at 6:37 AM Security researchers at Black Lotus Labs have discovered that Windows Server misconfigurations have kept servers at risk of being hit by a distributed denial of service (DDoS) attacks. Already, organizations are falling...

Twilio Revealed Another Breach On Its Server From The Same Group
Posted on October 31, 2022 at 8:41 AM U.S. communications service provider Twilio recently disclosed that it suffered another cyber attack carried out by the same threat actors behind the August hack that led to the unauthorized access of customers’...

Chinese APT10 Hackers Are Planting LODEINFO Malware In Antivirus Software
Posted on October 30, 2022 at 8:16 PM This Chinese Cicada hacking group has been discovered abusing antivirus security software to install a new version of the LODEINFO malware against Japanese organizations. The hacking group, tracked as APT10, was observed...

Hackers exploit Microsoft IIS web server logs to launch controlling malware
Posted on October 29, 2022 at 11:57 AM The Cranefly hacking group, also known as UNC3524, uses a controlling malware technique. The technique has previously not been seen and is used to deploy malware on infected devices through Microsoft Internet...

Number of customers affected in the Twilio hack rises as the second breach is detected
Posted on October 29, 2022 at 11:52 AM Twilio, one of the largest messaging platforms in the United States has announced that it was affected by another breach that occurred in June. Following the breach, hackers managed to access the...

British Hacker Convicted And For Operating Dark Web Marketplace, âThe Real Dealâ
Posted on October 29, 2022 at 11:34 AM A U.K. national has been charged for operating a dark web platform known as “The Real Deal.” The marketplace specializes in transactions on stolen login credentials and hacking tools. Daniel Kaye, 37,...

One Of The Longest Running Credit Card Breach Reported By See Tickets
Posted on October 27, 2022 at 8:27 AM Ticketing service provider “See Tickets” has informed customers about a data breach on their credit card payment details on its website. The company revealed that cybercriminals might have had access to those...

Chrome Extensions With Over 1 Million Installs Hijack Targeted Browsers
Posted on October 26, 2022 at 4:08 AM A new malvertising campaign has been discovered hijacking targeted browsers and inserting affiliate links into web pages. Analysts at Guardio Labs have called the campaign “Dormant Colors” since all the extensions have...

Malware leads to thousands of GitHub repositories delivering fake PoC exploits
Posted on October 24, 2022 at 6:16 PM Researchers from the Leiden Institute of Advanced Computer Science have uncovered thousands of GitHub repositories that deliver fake proof-of-concept (PoC) exploits. The exploits are attributed to several vulnerabilities, such as malware. Thousands...