Google, Mandiant say zero-day numbers reached all-time highs in 2021

Google and Mandiant released reports this week saying the number of disclosed and exploited zero-days reached record highs in 2021. Mandiant said it identified 80 zero-days exploited in the wild, more than double the record volume they saw in 2019. The term zero-day refers to newly-discovered vulnerabilities in which a vendor has zero days to […]

First phase of ‘Hack DHS’ finds over 120 vulnerabilities

Indianapolis – Circa August 2018: Logo and seal of the United States Department of Homeland Security. DHS runs Immigration and Customs Enforcement (ICE) The initial leg of the Homeland Security Department’s first-ever bug bounty program uncovered more than 120 cybersecurity vulnerabilities in some of its external systems, the agency announced on Friday. More than 450 […]

New Log4j attacks target SolarWinds, ZyXEL devices

Image: Possessed Photography // Unsplash Cybercriminals looking to capitalize on the Log4Shell vulnerability are attacking devices from SolarWinds and ZyXEL that are known to have used the Log4j library inside their software, according to two reports published on Wednesday by Microsoft and Akamai. The most urgent of these attacks are those spotted by Microsoft, which said it […]

New MoonBounce UEFI bootkit can’t be removed by replacing the hard drive

Security researchers from Kaspersky said on Thursday that they had discovered a novel bootkit that can infect a computer’s UEFI firmware. What makes MoonBounce—the name they gave the bootkit—special is the fact that the malware doesn’t burrow and hide inside a section of the hard drive named ESP (EFI System Partition), where some UEFI code typically […]

Israel police uses NSO’s Pegasus to spy on citizens

Mayors, leaders of political protests against former Prime Minister Benjamin Netanyahu, and former governmental employees, were among those tracked by police without a search or bugging warrant authorizing the surveillance Israel police uses NSO’s Pegasus spyware to remotely hack phones of Israeli citizens, control them and extract information from them, Calcalist has revealed. Among those […]

Crypto.com Says ‘Incident’ Was Actually $30 Million Hack

The cryptocurrency platform initially called the hack “an incident.” Photograph: YinYang/Getty Images Crypto.com, one of the largest cryptocurrency exchanges in the world, confirmed that its users got hacked and that the hackers withdrew more than $30 million in cryptocurrency from the wallets of 483 users. The admission comes after the company initially downplayed the hack, […]

16 Best DDOS Attack Tools in 2022

What are DDOS attack tools? DDOS attacks are cyber- attacks targeted at rendering certain computers, network systems and servers non-functional. The processes involved in its execution can be however complicated. Attackers have to carry out a long series of actions that involve social engineering, data breaches and sometimes even system testing. Due to the sophistication […]

US Military’s Hacking Unit to take on ransomware gangs

The Unit’s boss Gen. Paul Nakasone said that the US military computer operatives are ready to target ransomware gangs and state actors, whoever poses a threat to critical US infrastructure. The US military’s hacking division called Cyber Command is taking aggressive steps to fight cybercrime gangs targeting American organizations with ransomware. According to the unit’s […]

1.6 Million WordPress Sites Under Cyberattack From Over 16,000 IP Addresses

As many as 1.6 million WordPress sites have been targeted by an active large-scale attack campaign originating from 16,000 IP addresses by exploiting weaknesses in four plugins and 15 Epsilon Framework themes. WordPress security company Wordfence, which disclosed details of the attacks, said Thursday it had detected and blocked more than 13.7 million attacks aimed […]

Kali Linux 2021.4 Release – What’s New!!

Kali Linux 2021.4 is the fourth version of 2021, and Offensive Security releases one every quarter, so the 2021.4 release is the last of this year. Kali Linux is mainly used by cybersecurity professionals and ethical hackers, as it allows them to perform operations like:- Penetration testing. Security audits against internal. Security audits against remote […]