dlink vulnerability
| | | |

Understanding the Threat: Ficora and Kaiten Botnets Exploiting D-Link Vulnerabilities

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Old vulnerabilities die hard—especially in the world of cybersecurity. In 2024, the FICORA and CAPSAICIN botnets, leveraging decade-old D-Link router vulnerabilities, wreaked havoc across global networks. These botnets exploited weaknesses in the…

2024 data breaches scares
| | |

A Look at the Biggest Cyber Scares of 2024

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction The year 2024 served as a stark reminder of how sophisticated and disruptive cyberattacks have become. From crippling healthcare systems to exposing sensitive government communications, cybercriminals have demonstrated their ability to inflict…

china usa hacking back
| |

China Accuses the U.S. of Hacking Back Amid Cyber Conflict

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction The cyber conflict between the United States and China has escalated significantly in 2024, with both nations accusing each other of engaging in cyber espionage and critical infrastructure attacks. While the U.S….

russia cloudatlas
|

Understanding the Impact of Cloud Atlas Malware on Russia

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction The threat actor Cloud Atlas has resurfaced in 2024 with a sophisticated new malware strain, VBCloud, targeting over 80% of its victims in Russia. Leveraging advanced techniques such as NTFS Alternate Data…

North Korean hacker

Unraveling the Threat: North Korean Hackers and the Ottercookie Malware Campaign

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction North Korean cyber threat actors have introduced a new JavaScript-based malware called OtterCookie as part of their Contagious Interview campaign. This ongoing operation, also known as DeceptiveDevelopment, uses sophisticated social engineering techniques…

IntelBroker leaks 2.9 TB of exposed Cisco records
| | |

IntelBroker Leaks 2.9 TB of Exposed Cisco Records: What You Need to Know

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction On December 17, 2024, the notorious hacker IntelBroker released 2.9 TB of sensitive data allegedly stolen from a Cisco developer resource. This is part of a claimed 4.5 TB dataset linked to…

Juniper Networks Warns of Mirai Botnet
| | | | |

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Juniper Networks has issued a stark warning about the exploitation of Session Smart Router (SSR) products with default passwords in a malicious campaign deploying the notorious Mirai botnet malware. This development highlights…

'The Rise of Crypto-Hackers_ How North Koreans
| | |

The Rise of Crypto-Hackers: How North Koreans Steal $2.2 Billion

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Cryptocurrency platforms faced an unprecedented wave of cyberattacks in 2024, culminating in a staggering $2.2 billion in stolen assets, according to blockchain analytics firm Chainalysis. North Korean hackers dominated the scene, accounting…

malware UAC-0125 exploiting
|

Understanding UAC-0125: The Malware Disguised as an Army App

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction The evolving landscape of cyber warfare has taken another alarming turn with the recent disclosure by Ukraine’s Computer Emergency Response Team (CERT-UA). The threat actor UAC-0125 has been identified exploiting Cloudflare Workers…