Category cyber-attacks

Experts Uncover Backdoor Installed in U.S. Federal Agency Network

Backdoor Compromise Targets U.S. Federal Government Entity in APT-Style Attack A federal U.S. commission linked to international rights has suffered a significant security breach, as revealed by researchers who characterized the incident as a “classic APT-type operation.” The attack reportedly infiltrated the commission’s internal network through a backdoor, potentially compromising…

Read MoreExperts Uncover Backdoor Installed in U.S. Federal Agency Network

Hackers Expose Personal Information of ICE, DHS, DOJ, and FBI Officials

markdown In a groundbreaking revelation, researchers from UC San Diego and the University of Maryland have uncovered alarming vulnerabilities in satellite communications this week. Their study highlights that various sensitive data—including T-Mobile calls, text messages, in-flight Wi-Fi browsing sessions, and military communications—are being transmitted without encryption, potentially exposing them to…

Read MoreHackers Expose Personal Information of ICE, DHS, DOJ, and FBI Officials

CISA Compliance Guide for 2022

In recent years, the frequency and severity of cyberattacks have escalated dramatically, underscoring a pressing concern for organizations worldwide. A glance at the CISA list of significant cyber incidents reveals the alarming scale of these attacks. A notable instance occurred in May 2021 when a ransomware assault on Colonial Pipeline…

Read MoreCISA Compliance Guide for 2022

New BLISTER Malware Leverages Code-Signing Certificates to Bypass Detection

Recent research has unveiled an advanced malware campaign characterized by its use of legitimate code signing certificates to elude cybersecurity measures. This stealthy approach aims to deploy notorious payloads such as Cobalt Strike and BitRAT across compromised systems. The loader, identified as “Blister” by Elastic Security experts, exhibits an alarming…

Read MoreNew BLISTER Malware Leverages Code-Signing Certificates to Bypass Detection

Chinese APT Hackers Exploit Log4Shell to Attack Academic Institution

A sophisticated cyber intrusion attributed to a China-based threat group, identified as Aquatic Panda, has been detected leveraging severe vulnerabilities in the Apache Log4j logging system. This attack vector enabled the adversaries to execute various post-exploitation activities, including reconnaissance operations and credential harvesting from their targets. The cybersecurity firm CrowdStrike…

Read MoreChinese APT Hackers Exploit Log4Shell to Attack Academic Institution

One Republican Now Oversees a Significant Portion of US Election Infrastructure

Dominion Voting Systems Acquired by Knowink CEO: Implications for Election Integrity Last week, the acquisition of Dominion Voting Systems by Scott Leiendecker, founder and CEO of Knowink—an electronic poll book manufacturer based in Missouri—has raised questions among election integrity advocates concerning potential impacts on U.S. voter confidence and the electoral…

Read MoreOne Republican Now Oversees a Significant Portion of US Election Infrastructure

Microsoft Cautions on Ongoing Attacks Targeting Apache Log4j Vulnerabilities

Cybersecurity experts are raising alarms over ongoing attempts by both nation-state actors and commodity attackers to exploit vulnerabilities in the Log4j open-source logging framework, a situation that poses significant risks to organizations worldwide. Microsoft has reported a surge in exploitation attempts aimed at deploying malware on susceptible systems, highlighting the…

Read MoreMicrosoft Cautions on Ongoing Attacks Targeting Apache Log4j Vulnerabilities

Nation-State Hackers Distribute Malware via “Bulletproof” Blockchains

Cybersecurity Alert: North Korean Cyber Operatives Exploit Smart Contracts for Malware Deployment Recent investigations by Google have uncovered a sophisticated malware delivery system leveraging smart contracts on the Ethereum and BNB Smart Chain blockchains. The cost-effectiveness of creating or modifying these contracts—often below $2 per transaction—marks a stark contrast to…

Read MoreNation-State Hackers Distribute Malware via “Bulletproof” Blockchains

FBI, NSA, and CISA Alert on Russian Hackers Targeting Critical Infrastructure

US Intelligence Agencies Warn of Increased Cyber Threats from Russian Actors In light of escalating tensions between the U.S. and Russia related to Ukraine and Kazakhstan, American cybersecurity and intelligence agencies have issued a joint advisory detailing strategies for detecting, responding to, and mitigating cyberattacks perpetrated by Russian state-sponsored entities.…

Read MoreFBI, NSA, and CISA Alert on Russian Hackers Targeting Critical Infrastructure