Microsoft Threat Intelligence analysts are presenting groundbreaking research on North Korean and Chinese hacking activities, shedding light on years of threat actor tracking, infrastructure monitoring, and attacker tooling analysis at
Uncategorized
2000+ Palo Alto Firewalls Hacked Exploiting New Vulnerabilities
Over 2,000 Palo Alto Networks firewalls have been compromised in a widespread attack exploiting recently patched vulnerabilities. The attack, which began in mid-November 2024, has raised alarm bells across the
Top 6 Malware Persistence Mechanisms Used by Hackers: A Detailed Guide
Persistence mechanisms play a critical role in modern cyberattacks, helping malware remain active on compromised systems even after reboots, log-offs, or restarts. By exploiting built-in system features, attackers ensure their
Halo Security Launches Slack Integration for Real-Time Alerts on New Assets and Vulnerabilities
Halo Security, a leader in external attack surface management and penetration testing, has announced the launch of its new Slack® app, empowering cybersecurity teams to receive real-time alerts on newly
Wireshark 4.4.2: Fixes Vulnerabilities & Enhances Protocol Support
The Wireshark Foundation has announced the release of Wireshark 4.4.2, the latest version of its widely-used network protocol analyzer. This update brings many improvements, including critical bug fixes and enhanced
SquareX Brings Industry’s First Browser Detection Response Solution to AISA Melbourne CyberCon 2024
SquareX, the leading browser security company, will make its Australian debut at Melbourne CyberCon 2024, hosted by AISA (Australian Information Security Association), from 26th to 28th November 2024. SquareX will
Alleged Ford ‘Breach’ Encompasses Auto Dealer Info
Phobos Ransomware Admin Extradited As Part Of International Hacking Operation
A 42-year-old Russian national, Evgenii Ptitsyn has been extradited from South Korea to the United States to face charges related to his alleged role in administering the Phobos ransomware operation.
Ford Data Breach, Hackers Allegedly Leaked 44K Customer Data
Ford Motor Company, the American multinational automobile manufacturer, is reportedly investigating a potential data breach after hackers claimed to have stolen and leaked an internal database containing sensitive customer information.
How Can HTTP Status Codes Tip Off a Hacker?
In the Internet world, there are five different categories for HTTP status codes, which are used to indicate the result of a client’s request to a server. They help both