Category cyber-attacks

Record-Breaking DDoS Attack (1.35 Tbps) Strikes GitHub Website

On February 28, 2018, GitHub’s widely used code hosting service experienced a monumental distributed denial-of-service (DDoS) attack, peaking at an unprecedented 1.35 terabits per second (Tbps). This incident marks a significant milestone in the realm of cybersecurity, illustrating both the evolving nature of attack methods and the vulnerabilities that persist…

Read MoreRecord-Breaking DDoS Attack (1.35 Tbps) Strikes GitHub Website

Substack Data Breach: Over 662,000 User Records Exposed on Cybercrime Forum

Just three days before Substack informed its users of a security breach, an alternative narrative was making rounds within underground cybercrime forums. On February 2, 2026, a user on BreachForums, operating under the alias “w1kkid,” alleged that they had scraped Substack and gathered nearly 700,000 user records. This revelation was…

Read MoreSubstack Data Breach: Over 662,000 User Records Exposed on Cybercrime Forum

Emerging 4G LTE Network Vulnerabilities Enable Hackers to Spy, Track, Spoof, and Spam

Severe Vulnerabilities Discovered in 4G LTE Protocol: A Growing Cybersecurity Threat Security researchers have identified critical vulnerabilities within the 4G LTE protocol that pose significant risks to user privacy and device integrity. These weaknesses could potentially enable adversaries to intercept phone calls and messages, send fraudulent emergency alerts, spoof device…

Read MoreEmerging 4G LTE Network Vulnerabilities Enable Hackers to Spy, Track, Spoof, and Spam

ICE and CBP’s Face Recognition App Fails to Accurately Verify Identities

The face-recognition application Mobile Fortify, currently utilized by U.S. immigration enforcement across various locations, has come under scrutiny due to its limitations in accurately identifying individuals in public spaces. Reports from WIRED reveal that this app was deployed without the critical oversight that typically accompanies technologies influencing privacy. The Department…

Read MoreICE and CBP’s Face Recognition App Fails to Accurately Verify Identities

Record-Breaking 1.7 Tbps DDoS Attack: Memcached UDP Reflections Lead the Charge

Record-Breaking DDoS Attack Reaches 1.7 Tbps In a striking demonstration of escalating cyber threats, a staggering 1.7 Tbps distributed denial-of-service (DDoS) attack has recently been recorded, setting a new benchmark just four days after a previous record of 1.35 Tbps attacked GitHub. The incident underscores the urgent need for heightened…

Read MoreRecord-Breaking 1.7 Tbps DDoS Attack: Memcached UDP Reflections Lead the Charge

Sanctioned Bulletproof Host Tied to Hijacking of Legacy Home Routers

Recent research has uncovered a global campaign involving the hijacking of DNS settings in outdated home routers, which redirected web traffic through servers operated by Aeza International, a Russian bulletproof hosting provider sanctioned by the United States. Infoblox released findings on February 3 that reveal how home internet users in…

Read MoreSanctioned Bulletproof Host Tied to Hijacking of Legacy Home Routers

Attention Notepad++ Users: Potential Security Breach Linked to China

Compromise of Notepad++ Infrastructure Alerts Users to Cybersecurity Vulnerabilities In a significant breach of security, the update infrastructure for Notepad++, a popular text editor for Windows, was reportedly compromised for six months by hackers believed to be affiliated with the Chinese government. Developers disclosed this alarming situation on Monday, revealing…

Read MoreAttention Notepad++ Users: Potential Security Breach Linked to China

Release of Memcached DDoS Exploit Code Alongside 17,000 Vulnerable Servers List

Recently, two proofs-of-concept (PoC) for exploit codes targeting Memcached amplification attacks have emerged online, enabling even those with minimal technical expertise to carry out significant DDoS attacks through UDP reflection methods. The first tool, developed in C, utilizes a pre-compiled list of nearly 17,000 potentially vulnerable Memcached servers publicly accessible…

Read MoreRelease of Memcached DDoS Exploit Code Alongside 17,000 Vulnerable Servers List

Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials

Between late December 2025 and mid-January 2026, a sophisticated cyber operation targeted government officials and international diplomats. Researchers from Dream Labs uncovered that the hackers, identified as the China-backed Mustang Panda group (also known as HoneyMyte), successfully impersonated U.S. and other international entities. They utilized counterfeit documents to deceive high-level…

Read MoreChinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials