Critical remote access vulnerability in Windows 10-prior versions

A couple of weeks ago Microsoft released a security patch to fix a remote-code execution vulnerability in its Remote Desktop Protocol (RDP) services; now, IT security audit specialists report that there are still about a million Windows systems vulnerable to exploiting this flaw. If exploited, the vulnerability could generate serious global consequences; the IT security […]

MuddyWater APT’s BlackWater Malware Campaign Install Backdoor on Victims PC to Gain Remote Access & Evade Detection

Researchers discovered a “Blackwater” malware campaign that suspected to associated with well known MuddyWater APT bypass the security control and install a backdoor on Victims PC using MuddyWater’s tactics, techniques, and procedures (TTPs). MuddyWater involved with a various cyber attack in recent past and its spotted to targeting organizations in Pakistan, Turkey, and Tajikistan using […]

Google bans Huawei from accessing Android & its licensed apps

Intel Corp., Broadcom Inc., Qualcomm Inc., Xilinx Inc., etc., have also refused to supply critical components and software to Huawei. The US has decided to deny Huawei Technologies Co., a major Chinese tech firm, access to US technology to prevent Huawei’s growing influence in the country’s consumer device market. Immediately after the news about the […]

Hackers accessed Stack Overflow private systems

Stack Overflow has just announced that it has been the victim of a hacking attack that has given the threat actors access to the production systems of this platform, report experts from the IICS cybersecurity course. For now, only one security message has been posted on the website about “certain access to production” that occurred […]

Stack Overflow’s Production Systems Accessed by Hackers

In a brief announcement yesterday, Stack Overflow reports that it was the target of an attack that led hackers to access its production systems. The website is currently online and the few public details provided in a short message indicate that a survey revealed that a “level of production access was obtained on May 11”. […]

Chinese hackers accessed NSA hacking tools before Shadow Brokers leak

Chinese hackers then used NSA’s hacking tools and technology to target American allies. Symantec researchers have discovered that in 2016, Chinese intelligence managed to repurpose hacking tools used by the National Security Agency (NSA) and exploit them to attack American private firms and allies across the globe. In the new report published by The New […]

D-Link WiFi camera vulnerabilities allow access to user recordings

A WiFi camera (model DCS-2123L) designed by the manufacturer D-Link contains critical vulnerabilities that would allow a hacker to intercept and visualize the recordings stored on the device, in addition to altering the firmware, as mentioned by cyber forensics course specialists. The company has not completely corrected the flaws in this camera, which is one […]

Vulnerability found in preinstalled tool on Dell computers allows remote access

Cyber forensics course specialists report the presence of a new vulnerability in the SupportAssist tool, of the computer equipment manufacturer Dell; the reported flaw could allow threat actors to execute code with administrator privileges on exposed computers executing non-updated versions of this tool to take control of the victims’ systems. Although the company released a […]

Citrix Internal Network Hacked and Access the Most Sensitive Data for 6 Month by Unknown Hackers

Citrix finally confirms that the cybercriminals successfully compromised their internal network and accessed the most sensitive files also they removed from their network during the security breach that reported in March. Citrix Systems, Inc.a well-known software company that provides server, application, and desktop virtualization, networking, software as a service, and cloud computing technologies for NASA, […]

What is the Dark Web and how to Access it Safely

It is extremely easy to access the dark web and even easier to be detected on it if you don’t take precautions. If you are new to the darknet, this guide will help you on your way. The Dark Web, or Darknet, is a general term for a collection of websites on an encrypted network […]

Data breach at Docker; hackers steal access keys for almost 200k accounts

In recent days, a still not identified hacker group got unauthorized access to a Docker database, a company dedicated to programmer software development, compromising around 200k users’ accounts, as reported by cyber forensics course specialists. Docker allows developers to run software packages (containers), which are employed by some of the world’s leading technology companies. According […]

Docker Hub Hacked – Hackers Gained Access to 190,000 Users Accounts

Docker Hub Hacked, sensitive data more than 190,000 accounts may have exposed. Docker Hub discovered the unauthorized access to a single Hub database On Thursday, April 25th, 2019. Docker hub is the cloud repository which allows users to create a test, store and distribute container images. It also allows you to download the docker images […]

Russia Seeks Access to VPN Servers in a Bid to Increase Censorship

Russia’s censorship agency, Roskomnadzor, has demanded 10 VPN service providers to link their Russian servers to the network of the agency. This action aligns with Russia’s efforts to stop citizens from visiting banned websites. The order said the VPN service providers should link their servers located in Russia by April 26, 2019. Russian Government’s Demands […]

Hackers Launching DNS Hijacking Attack to Gain Access to Telecommunication & ISP Networks

Researchers discovered a new malicious campaign called “Sea Turtle,” attack public and private entities in various countries using DNS hijacking as a mechanism. State sponsored threat actors compromise at least 40 different organizations across 13 different countries during this malicious campaign in the first quarter of 2019. Attackers carried out highly persistent tactics and advanced […]

Hackers Launching Malware via Weaponized Excel File to Gain the Remote Access to the Target Computers

Cyber criminals launching a new malware campaign that make use of legitimate script engine AutoHotkey with a malicious script to evade detection and also gain the remote access to the targeted system. AutoHotkey is an open source Microsoft Windows tool that allows you to create macros, scripts, and automate frequently performed tasks on your computer.  Attackers […]

Microsoft Hacked – Hackers Compromised The Microsoft Employee’s Account to Gain Access the Customers Email

Microsoft announced a data breach by unknown hackers who have compromised the Microsoft technical support agent’s credentials and gain access to some of the Microsoft customer’s Email. Cybercriminals breached the Microsoft network between January 1 and March 28 and compromise the Microsoft support agent’s credentials. Microsoft notified to the customer via Email on Friday said, […]

Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts

If you have an account with Microsoft Outlook email service, there is a possibility that your account information has been compromised by an unknown hacker or group of hackers, Microsoft confirmed The Hacker News. Earlier this year, hackers managed to breach Microsoft’s customer support portal and access information related to some email accounts registered with […]

Box.com Flaw Enables Folder/File Access To Unauthorized Users

A critical flaw in Box.com cloud-storage solution was recently discovered that make files stored in the service accessible by external unauthorized users if users are not security-conscious. Box.com is a mainstream cloud-storage service with many corporate account holders storing their personal and business files in the encrypted storage service. The corporate account is at risk, […]