Category cyber-attacks

New Malware Discovered Utilizing Google Drive as Its Command-and-Control Server

Recent developments in the cybersecurity landscape have revealed a concerning trend wherein malicious actors leverage the infrastructure of legitimate online services to disguise their activities. According to experts, the latest campaign attributed to the DarkHydrus APT group has now employed Google Drive as its command-and-control (C2) server, a notable shift…

Read MoreNew Malware Discovered Utilizing Google Drive as Its Command-and-Control Server

DHS Directs Federal Agencies to Conduct DNS Security Audits for Their Domains

On October 10, the U.S. Department of Homeland Security (DHS) issued an urgent directive mandating that all federal agencies conduct thorough audits of their Domain Name System (DNS) records within the next ten business days. This emergency measure follows a series of concerning DNS hijacking incidents, which security experts, with…

Read MoreDHS Directs Federal Agencies to Conduct DNS Security Audits for Their Domains

Michigan Man Discovers the Hard Way That “Catch a Cheater” Spyware Apps Are Illegal

In a troubling development within the realm of cybersecurity, Paul Fleming, the creator of pcTattletale, a controversial surveillance application, recently faced legal repercussions after allegations surfaced regarding the misuse of his software for unauthorized spying. Despite being made aware that individuals were employing his product to invade others’ privacy, Fleming…

Read MoreMichigan Man Discovers the Hard Way That “Catch a Cheater” Spyware Apps Are Illegal

GandCrab Ransomware and Ursnif Virus Distributing Through MS Word Macros

Security researchers have identified two distinct malware campaigns targeting systems through phishing strategies, one distributing both the Ursnif data-stealing trojan and GandCrab ransomware, while the other focuses solely on Ursnif. These threats originate from two separate cybercriminal groups but exhibit several operational similarities. Both campaigns initiate through phishing emails containing…

Read MoreGandCrab Ransomware and Ursnif Virus Distributing Through MS Word Macros

ChatGPT Faces New Data-Exploitation Attack, Highlighting Ongoing AI Challenges

OpenAI’s ChatGPT Undergoes Adjustments Following Cyber Vulnerability Exploit In a recent development, OpenAI has implemented critical changes to its AI language model, ChatGPT, to guard against a sophisticated exploitation known as ShadowLeak. The adjustments are aimed at limiting the model’s capability to open or modify URLs, effectively blocking the attack…

Read MoreChatGPT Faces New Data-Exploitation Attack, Highlighting Ongoing AI Challenges

Europol Takes Action Against Individuals Purchasing DDoS-for-Hire Services

Recent law enforcement efforts reveal that individuals who engaged with DDoS-for-hire services may now be facing serious repercussions. Following the takedown of the world-renowned DDoS-for-hire platform Webstresser.org in April 2018, authorities are now focusing on the clients who utilized this service to orchestrate millions of cyber attacks against a range…

Read MoreEuropol Takes Action Against Individuals Purchasing DDoS-for-Hire Services