Category cyber-attacks

British Hacker Confesses to Utilizing Mirai Botnet for Deutsche Telekom DDoS Attack

Cyber Attack on Deutsche Telekom: A Guilty Plea from a Key Suspect A 29-year-old man, identified by authorities as “Daniel K.,” has pleaded guilty in a German court to charges related to the hacking of over one million Deutsche Telekom routers. This incident marks a significant breach in the telecommunications…

Read MoreBritish Hacker Confesses to Utilizing Mirai Botnet for Deutsche Telekom DDoS Attack

Experts Uncover Cyber Espionage Campaigns by CopyKittens Hackers

Major Cyber Espionage Campaign Identified, Targeting Government and Academic Sectors Security analysts have uncovered a significant cyber espionage initiative primarily directed at personnel within government, defense, and academic institutions across various nations. This campaign is attributed to a threat group connected to Iran, with comprehensive findings detailed in a report…

Read MoreExperts Uncover Cyber Espionage Campaigns by CopyKittens Hackers

Metadata Reveals Authors Behind ICE’s ‘Mega’ Detention Center Plans

A PDF document distributed by officials from the Department of Homeland Security (DHS) to New Hampshire Governor Kelly Ayotte’s office has inadvertently revealed sensitive information regarding individuals involved in its creation. This document details a plan to establish large-scale detention and processing centers known as “mega” detention facilities across the…

Read MoreMetadata Reveals Authors Behind ICE’s ‘Mega’ Detention Center Plans

How Opening a Malicious PowerPoint File Can Compromise Your PC

In recent developments within the cybersecurity landscape, a noteworthy malware campaign has emerged, capitalizing on a previously reported vulnerability in Microsoft Office. This particular flaw, identified as CVE-2017-0199, relates to the Windows Object Linking and Embedding (OLE) interface. Although Microsoft issued a patch addressing this vulnerability earlier this year, threat…

Read MoreHow Opening a Malicious PowerPoint File Can Compromise Your PC