Hacks

RDP Attacks: Hackers Exploit Red Team Tools, TOR, and VPNs to Steal Data

Earth Koshchei executed a sophisticated RDP attack involving spear-phishing emails with malicious RDP configuration files, which files redirected victims' systems to 193 RDP relays,...

Reyee IoT Devices Hacked Over-the-Air : No Wi-Fi Login Required

Ruijie Networks' Reyee cloud management platform and the Reyee OS network devices that are associated with it have been found to have a critical...

Russian Hacktivists Launch Cyber Attacks on U.S. Infrastructure

Two Russian hacktivist groups, People’s Cyber Army and Z-Pentest, are escalating cyberattacks on critical infrastructure, including oil and gas and water systems, as their...

RedLine Malware Exploits Pirated Software to Steal Logins

Hackers targeted users of unlicensed corporate software by distributing malicious activators on accounting forums, which disguised as legitimate tools contained the RedLine stealer.  The attackers...

Hackers Use Fake Domains to Target Global Sports Logins

Cybercriminals capitalize on high-profile events to exploit public interest by registering deceptive domains mimicking official websites to sell counterfeit goods, offer fraudulent services, and...

Popular

Subscribe

spot_imgspot_img