Browsing category

Cyber Attack

Cyber Attacks Stopped By An Israeli Bomb

Justice, Israel style, the final judgment of Israeli Defense Force (IDF) against cyber attackers was decisive and literally with the “bang”. The highly contested Gaza strip between Israel and Palestinian Hamas has been going on for many decades, but according to the Israeli military intelligence, the later also house an elite hacker unit along with […]

North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data

The U.S. Department of Homeland Security (DHS) and the FBI have issued another joint alert about a new piece of malware that the prolific North Korean APT hacking group Hidden Cobra has actively been using in the wild. Hidden Cobra, also known as Lazarus Group and Guardians of Peace, is believed to be backed by […]

Israel Neutralizes Cyber Attack by Blowing Up A Building With Hackers

The Israel Defense Force (IDF) claims to have neutralized an “attempted” cyber attack by launching airstrikes on a building in Gaza Strip from where it says the attack was originated. As shown in a video tweeted by IDF, the building in the Gaza Strip, which Israeli fighter drones have now destroyed, was reportedly the headquarters […]

ATO Attacks Affect Around 4,000 Office 365 Accounts

ATO (Account Takeover) attacks have reportedly impacted roughly 4,000 Office 365 accounts, which were later used to carry out malicious activities. Details about the attacks, which spanned one whole month, have been given out by researchers at Barracuda Networks in a report dated May 2, 2019. The report says, “Barracuda researchers have revealed a startling […]

Hackers Found Exploiting Oracle WebLogic RCE Flaw to Spread Ransomware

Taking advantage of newly disclosed and even patched vulnerabilities has become common among cybercriminals, which makes it one of the primary attack vectors for everyday-threats, like crypto-mining, phishing, and ransomware. As suspected, a recently-disclosed critical vulnerability in the widely used Oracle WebLogic Server has now been spotted actively being exploited to distribute a never-before-seen ransomware […]

How to Protect Yourself from Online Cyber Attacks at Work

Anyone who is on the internet is vulnerable to cyber attacks. Today, we depend on the internet for all kinds of things, including shopping, financial services and transactions, communication, entertainment etc. At work also, the internet plays a key role. Hence, it’s important that we stay secure, whenever we are on the internet. Here’s a […]

Yet Again! Cyber Attack on Toyota Car Maker

Once again Toyota Motor Corporation reported its second data breach. The first attack was in February, and it’s not clear whether the two incidents are related. The latest incident, revealed Friday, that a breach has affected its sales offices in Japan, breaching data of up to 3.1 million customers. In February, Toyota’s Australia branch announced […]

Man-in-the-Middle (MITM) Attacks: An Introduction

What is a Man-in-the-Middle (MITM) Attacks – Definition MITM attack refers to the kind of cyberattack in which an attacker eavesdrops on the communication between two targets- two legitimately communicating hosts- and even hijacks the conversation between the two targets. Thus, the attacker is able to “listen” to a conversation that he is not supposed […]

Australia’s Election Proposal To Combat Cyber Attack

As a precaution to the risk of getting its election hacked, Australia has to create a special task force that will be tasked to inspect and prevent security issues come election time. This proposal is announced by the Joint Standing Committee on Electoral Matters to the Australian Electoral Commission (AEC). Titled “Report on the Conduct […]

1 Million Swiss Devices Victim Of Cyber Attack

Cyber attacks are not always dramatic in nature, to a point that the users receive notification that something bad is already happening in the system that needs the attention of system administrators. Cyber espionage is one, where the goal is to extract as much information for the system as possible without the possibility of getting […]

U.S. Cyber Attacks Against Russia’s Federal News Agency

The United States military has publicly disclosed that it launched a cyber attack against Russia’s Federal News Agency (FAN), the news website arm of the Russian Internet Research Agency (IRA). The U.S. instigate the cyber attacks against what it considered as an alleged Russian-hosted “troll farm” which the U.S. accused of mass producing fake news. […]

The Cyprus Story: Their Preparation Against Cyber Attacks

Last Dec 22, 2018, we have reported here in Hackercombat.com the nastly leak of the European Union COREU network that contains diplomatic cables. With that news, Cyprus, an island nation in the Mediterranean is making their own preparations and improvements in their cybersecurity readiness. With the EU info leak, Cyprus has a very visible example […]

Student Loans Company Hit by One Million Cyber Attacks in 2018

Cybercriminals love to target institutions that either holds a lot of personal information or lots of money with weak security. Of course, the mainstream banks have a lot of money but they are spending a lot as well when it comes to cybersecurity system. So what is the next sector to target? Bank-like institutions but […]

Digital Media Security Against Corporate Cybersecurity Culture

Currently, we live in the era of digital transformation, where the logic of business and, above all, information has migrated to digital media, which implies a greater challenge for organizations to protect their data. This is the ‘new normal’, not even the almighty giants like Google, Facebook, Apple, Microsoft, Intel and other Silicon Valley organizations […]

Cyber Warfare – How to Keep Your Consumer Devices Safe

According to the 2019 Cyber Threat Outlook published by defense industry firm Booz Allen Hamilton, the year 2019 is likely to see an increase of state actors taking aim at the private sector in foreign companies, continuing an ongoing trend over the past several years. The report published quotes about economically-motivated attacks, aimed at “stealing […]

Credential Stuffing Attack Hits Dailymotion

Dailymotion, the rival to Youtube’s video-sharing empire, has become a victim of a cyber attack called credential stuffing. It is an attack using the usernames and passwords from other data breaches against Dailymotion’s login system. This is highly effective since people usually reuse the same username and passwords across multiple web services. This same attack […]

Cyber Attack Targets French Engineering Consultant Altran

Cybersecurity experts have warned that the massive data breach that might be the biggest ever posted on the internet is just the beginning. The trove of sensitive information that was published to the internet this week, allowing anyone to download a collection of hundreds of millions of email addresses and passwords. They are likely to […]

WordPress Websites Attacked via Zero-Day in Abandoned Plugin

Many WordPress websites have come under attack via a zero-day flaw in an abandoned plugin. The “Total Donations” plugin, which was earlier used by many WordPress website owners, has now started creating issues. Some hackers have started exploiting an unpatched vulnerability in the code of this plugin to attack WordPress websites. Security experts at Defiant, […]

New Trend? Antivirus Software Exploited To Launch Privilege Escalation Attack

How can cybercriminals penetrate a network or computer if there are security software in place to prevent it? Some cyber criminals have the answer, attack the very software used for securing the computer/network. That is the exact scenario that happened with ZoneAlarm antivirus, becoming the victim of a very clever vulnerability attack, as reported by […]

Average Cost of Cyberattack Exceeds $1 Million: Report

The average cost of a cyberattack today exceeds $1 million, as per a recent survey report. Security firm Radware, which provides cybersecurity and application delivery solutions, has released its 2018-2019 Global Application and Network Security Report, which brings to light this and other relevant findings. The Radware Global Application and Network Security Report, which is […]