Category cyber-attacks

Hackers Targeting Database Servers to Mine Cryptocurrency

Chinese Cybercrime Group Targets Database Servers Globally Recent investigations by security firm GuardiCore Labs have uncovered a series of extensive cyber-attack campaigns spearheaded by a prominent Chinese criminal organization. These attacks, which utilize multiple innovative techniques, are primarily aimed at database servers for the illicit purposes of mining cryptocurrencies, extracting…

Read MoreHackers Targeting Database Servers to Mine Cryptocurrency

Satori IoT Botnet Takes Advantage of Zero-Day Vulnerability to Compromise Huawei Routers

The recent resurgence of IoT malware variants, specifically those derived from the infamous Mirai botnet, presents a significant cybersecurity threat. Although the original creators of Mirai have been apprehended, its code remains publicly accessible, enabling cybercriminals to exploit its vulnerabilities. Hackers have leveraged this botnet to covertly build networks of…

Read MoreSatori IoT Botnet Takes Advantage of Zero-Day Vulnerability to Compromise Huawei Routers

Two Romanians Indicted for Hacking Police CCTV Cameras Ahead of Trump Inauguration

Cybersecurity Incident: Hacking of Washington D.C. Police Surveillance Cameras In a significant cybersecurity breach, a pair of Romanian nationals successfully compromised approximately 70% of the computers controlling the Washington D.C. Metropolitan Police Department’s surveillance camera network earlier this year. This incident unfolded just days before the inauguration of President Donald…

Read MoreTwo Romanians Indicted for Hacking Police CCTV Cameras Ahead of Trump Inauguration

Pride Month Phishing Scams Target Employees Using Trusted Email Services

Although Pride Month does not officially start until June 1, 2026, cybersecurity experts have already noted a rise in phishing attacks targeting employees with Pride-themed emails, indicating that scammers are capitalizing on upcoming events well ahead of time. Organizations are currently facing a phishing campaign leveraging Pride Month and diversity…

Read MorePride Month Phishing Scams Target Employees Using Trusted Email Services

[Guide] Safeguarding Your Devices from Meltdown and Spectre Attacks

In a significant development for cybersecurity, two critical vulnerabilities in processor architecture—dubbed Meltdown and Spectre—have come to light, prompting urgent responses from technology vendors aimed at mitigating the associated risks. These vulnerabilities affect a vast range of modern processors and pose threats to virtually all operating systems, including Windows, Linux,…

Read More[Guide] Safeguarding Your Devices from Meltdown and Spectre Attacks

Original Secure Boot Certificates for Windows Expire in June—Here’s What You Should Do

Assessing Secure Boot Certificates for Enhanced Cybersecurity As organizations continue to navigate the complexities of cybersecurity, the integrity of their systems takes center stage. An essential component in ensuring that integrity is the management of Secure Boot certificates. These certificates, embedded within a computer’s firmware, authenticate the operating system at…

Read MoreOriginal Secure Boot Certificates for Windows Expire in June—Here’s What You Should Do

New Mirai Okiru Botnet Sets Its Sights on Devices with Common ARC Processors

The landscape of cybersecurity threats has reached unprecedented dimensions and is projected to escalate significantly in 2018. The original architects of the notorious Mirai DDoS botnet have been apprehended, yet variants of this infamous IoT malware continue to proliferate, largely due to the public availability of its source code on…

Read MoreNew Mirai Okiru Botnet Sets Its Sights on Devices with Common ARC Processors

AI: The New Challenger to Nuclear Treaties. Should We Be Concerned?

New Strategies Proposed for Global Nuclear Monitoring Amid Treaty Expirations For decades, nuclear powers around the globe have functioned within a complex web of treaties designed to progressively reduce the stockpile of nuclear weapons. However, with these agreements increasingly falling by the wayside, a credible alternative for monitoring these arsenals…

Read MoreAI: The New Challenger to Nuclear Treaties. Should We Be Concerned?

15-Year-Old Student Impersonates CIA Chief to Access Classified Information

The hacking group known as “Crackas With Attitude” has garnered significant attention for its high-profile attacks on U.S. intelligence services. Most notably, the group was responsible for exposing sensitive information regarding approximately 29,000 federal officials, including 20,000 FBI agents and 9,000 members of the Department of Homeland Security, during a…

Read More15-Year-Old Student Impersonates CIA Chief to Access Classified Information