Browsing tag

cyber attacks

New Python-based FBot Hacking Toolkit Aims at Cloud and SaaS Platforms

A new Python-based hacking tool called FBot has been uncovered targeting web servers, cloud services, content management systems (CMS), and SaaS platforms such as Amazon Web Services (AWS), Microsoft 365, PayPal, Sendgrid, and Twilio. “Key features include credential harvesting for spamming attacks, AWS account hijacking tools, and functions to enable attacks against PayPal and various […]

CISA and FBI Issue Warning About Rhysida Ransomware Double Extortion Attacks

The threat actors behind the Rhysida ransomware engage in opportunistic attacks targeting organizations spanning various industry sectors. The advisory comes courtesy of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC). “Observed as a ransomware-as-a-service (RaaS) model, Rhysida actors have compromised […]

CISA Warns of Daixin Team Hackers Targeting Health Organizations With Ransomware

U.S. cybersecurity and intelligence agencies have published a joint advisory warning of attacks perpetrated by a cybercrime gang known as the Daixin Team primarily targeting the healthcare sector in the country. “The Daixin Team is a ransomware and data extortion group that has targeted the HPH Sector with ransomware and data extortion operations since at […]

5 Biggest Ransomware Attacks of All Time

Cybersecurity threats, and in particular ransomware attacks, are facts of life and daily occurrences in an increasingly digital economy. The more commercial activity takes place via the internet and using hardware and software that interfaces with the web, the more vulnerable a business is to the depredations of malicious actors. Interestingly, most of the largest […]

2,000 Cyber Attacks Affect Georgia Websites

About 2,000 websites in Georgia were compromised in a major cyber attack on Monday, including those of the President, courts and the press. The photograph of Georgia’s former exiled president Mikheil Saakashvili was presented with an inscription “I will be back!” The website of Georgian President Salome Zurabishvili was “attacked this afternoon by hackers,” her […]

How to Protect Your Online Store from Cyber Threats

Owning an online store can be a fabulous and lucrative venture in today’s marketplace. With so many sales and transactions taking place online, it can seem like the very best place for you to set up shop. But, while owning an online store can certainly lead to success, it also opens the door to cyber […]

New Ransomware Attack – Texas Government agencies become Victim

Still, Ransomware attacks become a problem on local governments, and Texas discovers this first-hand. On the morning of August 16, 23 government entities reported a ransomware attack. Most were “smaller local governments,” and the State of Texas networks and systems were not hit by the Department of Information Resources. “It appears all entities that were […]

Blinking Red Light of Death for Cameras

Cameras you can find on street corners, offices, and public spaces can all be used by attackers in one way or another in order to steal sensitive information. Researchers from the Ben-Gurion University of the Negev were able to create a method to use infrared (which can look like a blinking red light) from certain […]

How to write an information security analyst job description

One of the diverse critical tools in the human resource department is a job description. It’s one of the paramount tools that aid in an employer’s staffing programs. Job description usually stipulates the duties, responsibilities any relevant skills required, the level of training and education needed for the job. Job descriptions don’t just come into […]

Cyber Attacks From The Point Of View Of Financial Enterprise

As we have repeatedly mentioned here in Hackercombat.com, hackers today are no longer interested in digital vandalism against systems and websites. Showing how good you are in cracking and hacking may give you a boost of ego, but the buck stops there, you may still end up behind bars when caught. Might as well earn […]

Cases of Cyber-Attacks in Kenya Rise to 11.2 Million

Security researchers have found that 11.2 million cyber-attacks hit organizations in Kenya in the first quarter of 2019, this is a 10.1 percent increase in the number of security incidents compared to the previous quarter. The Kenya Communications Authority (CA) reports that the Incident Response Center has detected an increase in malware, web application attacks, […]

SOC Second Defense Phase – Understanding the Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the Attack Chain. Let’s move on to the phases of SOC and advanced level of protecting the organization. Early years, when we say the virus, it’s just an ‘exe’ file with some […]

Bulgarian IT Expert Arrested For Revealing Vulnerability in Software

Bulgarian authorities arrested an IT expert for demonstrating a flaw in the security of the software used by local kindergartens. This vulnerability allows Petko Petrov to download details of 235,543 people in Stara Zagora, a province in central Bulgaria with more than 333,000 inhabitants. Petkov demonstrated the software flaw in a video that he posted […]

Generate Virtual Online IDs, Prevent Attacks

Giving out your email address or phone number when signing in for an online service could land you in trouble. You might end up being a victim of a SIM swapping hack, with hackers taking control of your account by stealing your phone number and using it to bypass the text message-based 2-factor authentication. SIM […]

Ryuk Ransomware Variant Blacklists IP Addresses, Computers

A new variant of the Ryuk ransomware, which blacklists IP addresses and computers and thus simplifies the infection process, has been detected. MalwareHunterTeam had discovered this new sample which adds IP address and computer blacklisting so that the matching computers will not be encrypted. A BleepingComputer report dated June 19, 2019 says, “A new variant […]

Do You Know When The First Cyber Attack Took Place? Read On

WannaCry, a malicious computer virus that encrypts data and demands ransom, hit thousands of computers across the world, causing several organization to close down. Not a day goes by without a large company admits that its data has been breached. Cyber attacks are more known to be a thing of modern life, but their story […]

Our Long Collective Struggle To Secure Enterprise Email

Email is the oldest service on the Internet, launched in the 1970’s, it is older than the WWW or the World Wide Web itself for more than three decades. However, the fundamentals of sending and receiving email have not fundamentally changed, in fact, all the weaknesses of the email systems of the 70s are still […]

The Fileless Malware Attacks Are Here To Stay

The development methodology of malware has changed drastically, something that cannot be ignored. A few years ago, the primary objective of the hackers was to rake profit and avoid detection. However, these criminals have realized that the longer they have an infected endpoint, the more money they make. Then came fileless Malware, a kind of […]