Cyber Attack

Hackers Install macOS Malware Using Weaponized Calendar Invites

Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading malware disguised as event...

GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

A new backdoor has been discovered which uses GTP-C (GPRS Tunnelling Protocol - Control Plane) signaling messages for communicating with the C2 server. This...

Attackers Use Multiple Ivanti Connect Secure and Policy Secure Gateway Bugs

In a significant cybersecurity development, threat actors have exploited multiple vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways, prompting urgent responses from...

Russian Cyber Criminals use Hacked Routers

The Internet Crime Complaint Center (IC3) has issued a warning about Russian cyber actors who have been exploiting network infrastructure devices around the world,...

Cyber Espionage: SPIKEDWINE Campaign Targets European Diplomats

Zscaler's ThreatLabz team has uncovered a sophisticated cyber espionage campaign, dubbed SPIKEDWINE, which targets European diplomats using a malware known as WINELOADER. The discovery...

Popular

Subscribe

spot_imgspot_img