Category cyber-attacks

Rocket Report: California’s New Super-Heavy Launch Site and 2025 Year in Review

International Launches and Aerospace Developments: A 2025 Overview In 2025, China solidified its position as a leader in aerospace with 92 orbital launches, followed by Russia’s 17. Europe managed eight launches, while India, Japan, South Korea, Israel, Iran, and Australia each contributed to the global tally, albeit in smaller numbers.…

Read MoreRocket Report: California’s New Super-Heavy Launch Site and 2025 Year in Review

New Malware Discovered Utilizing Google Drive as Its Command-and-Control Server

Recent developments in the cybersecurity landscape have revealed a concerning trend wherein malicious actors leverage the infrastructure of legitimate online services to disguise their activities. According to experts, the latest campaign attributed to the DarkHydrus APT group has now employed Google Drive as its command-and-control (C2) server, a notable shift…

Read MoreNew Malware Discovered Utilizing Google Drive as Its Command-and-Control Server

DHS Directs Federal Agencies to Conduct DNS Security Audits for Their Domains

On October 10, the U.S. Department of Homeland Security (DHS) issued an urgent directive mandating that all federal agencies conduct thorough audits of their Domain Name System (DNS) records within the next ten business days. This emergency measure follows a series of concerning DNS hijacking incidents, which security experts, with…

Read MoreDHS Directs Federal Agencies to Conduct DNS Security Audits for Their Domains

Michigan Man Discovers the Hard Way That “Catch a Cheater” Spyware Apps Are Illegal

In a troubling development within the realm of cybersecurity, Paul Fleming, the creator of pcTattletale, a controversial surveillance application, recently faced legal repercussions after allegations surfaced regarding the misuse of his software for unauthorized spying. Despite being made aware that individuals were employing his product to invade others’ privacy, Fleming…

Read MoreMichigan Man Discovers the Hard Way That “Catch a Cheater” Spyware Apps Are Illegal

GandCrab Ransomware and Ursnif Virus Distributing Through MS Word Macros

Security researchers have identified two distinct malware campaigns targeting systems through phishing strategies, one distributing both the Ursnif data-stealing trojan and GandCrab ransomware, while the other focuses solely on Ursnif. These threats originate from two separate cybercriminal groups but exhibit several operational similarities. Both campaigns initiate through phishing emails containing…

Read MoreGandCrab Ransomware and Ursnif Virus Distributing Through MS Word Macros

ChatGPT Faces New Data-Exploitation Attack, Highlighting Ongoing AI Challenges

OpenAI’s ChatGPT Undergoes Adjustments Following Cyber Vulnerability Exploit In a recent development, OpenAI has implemented critical changes to its AI language model, ChatGPT, to guard against a sophisticated exploitation known as ShadowLeak. The adjustments are aimed at limiting the model’s capability to open or modify URLs, effectively blocking the attack…

Read MoreChatGPT Faces New Data-Exploitation Attack, Highlighting Ongoing AI Challenges