Category cyber-attacks

Emerging 4G LTE Network Vulnerabilities Enable Hackers to Spy, Track, Spoof, and Spam

Severe Vulnerabilities Discovered in 4G LTE Protocol: A Growing Cybersecurity Threat Security researchers have identified critical vulnerabilities within the 4G LTE protocol that pose significant risks to user privacy and device integrity. These weaknesses could potentially enable adversaries to intercept phone calls and messages, send fraudulent emergency alerts, spoof device…

Read MoreEmerging 4G LTE Network Vulnerabilities Enable Hackers to Spy, Track, Spoof, and Spam

ICE and CBP’s Face Recognition App Fails to Accurately Verify Identities

The face-recognition application Mobile Fortify, currently utilized by U.S. immigration enforcement across various locations, has come under scrutiny due to its limitations in accurately identifying individuals in public spaces. Reports from WIRED reveal that this app was deployed without the critical oversight that typically accompanies technologies influencing privacy. The Department…

Read MoreICE and CBP’s Face Recognition App Fails to Accurately Verify Identities

Record-Breaking 1.7 Tbps DDoS Attack: Memcached UDP Reflections Lead the Charge

Record-Breaking DDoS Attack Reaches 1.7 Tbps In a striking demonstration of escalating cyber threats, a staggering 1.7 Tbps distributed denial-of-service (DDoS) attack has recently been recorded, setting a new benchmark just four days after a previous record of 1.35 Tbps attacked GitHub. The incident underscores the urgent need for heightened…

Read MoreRecord-Breaking 1.7 Tbps DDoS Attack: Memcached UDP Reflections Lead the Charge

Sanctioned Bulletproof Host Tied to Hijacking of Legacy Home Routers

Recent research has uncovered a global campaign involving the hijacking of DNS settings in outdated home routers, which redirected web traffic through servers operated by Aeza International, a Russian bulletproof hosting provider sanctioned by the United States. Infoblox released findings on February 3 that reveal how home internet users in…

Read MoreSanctioned Bulletproof Host Tied to Hijacking of Legacy Home Routers

Attention Notepad++ Users: Potential Security Breach Linked to China

Compromise of Notepad++ Infrastructure Alerts Users to Cybersecurity Vulnerabilities In a significant breach of security, the update infrastructure for Notepad++, a popular text editor for Windows, was reportedly compromised for six months by hackers believed to be affiliated with the Chinese government. Developers disclosed this alarming situation on Monday, revealing…

Read MoreAttention Notepad++ Users: Potential Security Breach Linked to China

Release of Memcached DDoS Exploit Code Alongside 17,000 Vulnerable Servers List

Recently, two proofs-of-concept (PoC) for exploit codes targeting Memcached amplification attacks have emerged online, enabling even those with minimal technical expertise to carry out significant DDoS attacks through UDP reflection methods. The first tool, developed in C, utilizes a pre-compiled list of nearly 17,000 potentially vulnerable Memcached servers publicly accessible…

Read MoreRelease of Memcached DDoS Exploit Code Alongside 17,000 Vulnerable Servers List

Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials

Between late December 2025 and mid-January 2026, a sophisticated cyber operation targeted government officials and international diplomats. Researchers from Dream Labs uncovered that the hackers, identified as the China-backed Mustang Panda group (also known as HoneyMyte), successfully impersonated U.S. and other international entities. They utilized counterfeit documents to deceive high-level…

Read MoreChinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials

New Cryptocurrency Mining Malware Compromises Over 500,000 PCs in Just Hours

Rapidly Spreading Malware Targets Windows Systems, Infecting Thousands in Hours In a recent surge of cyber activity, Microsoft discovered a potent cryptocurrency-mining malware known as Dofoil, also referred to as Smoke Loader, which infected nearly 500,000 computers within a mere 12-hour timeframe. The company was able to largely mitigate the…

Read MoreNew Cryptocurrency Mining Malware Compromises Over 500,000 PCs in Just Hours

Microsoft Issues Critical Office Update as Russian-Linked Hackers Strike.

In a swift and alarming development, Russian state-sponsored hackers have taken advantage of a significant vulnerability in Microsoft Office, enabling them to breach devices within diplomatic, maritime, and transportation sectors across multiple nations. This intrusion was reported by cybersecurity researchers on Wednesday, highlighting the escalating sophistication of such cyber threats.…

Read MoreMicrosoft Issues Critical Office Update as Russian-Linked Hackers Strike.