Cyber Attacks

Oracle WebLogic Servers Hit With Zero-Day Attack

Oracle WebLogic Servers are not the usual targets when it comes to cyber attacks. Besides, the service is a niche and is facing strong competition from the likes of Amazon with their AWS and Google with its fleet of web services. This time, a new ransomware variant named Sodinokibi has penetrated WebLogic Servers using a

[ Read More ]

Beapy Cryptojacking Malware: The Return Of Eternal Blue Exploit

The Eternal Blue exploit, the infamous Windows bug that the U.S. National Security Agency weaponized and was eventually leaked by the Shadow Brokers hacking group, which was then later used for the successful WannaCry ransomware campaign in 2017 is re-emerging. WannaCry launched ransomware into public prominence and even made an estimated $4 billion profit for

[ Read More ]

Espionage Malware Karkoff Campaign Revealed

Cisco Talos has revealed in a report that the new campaign initiated by a group of hackers responsible for DNSpionage earlier that uses malware to infiltrate target firms. The malware has the capability to use both regular http and dns-based communication to its command and control servers, moving data stolen from computers to the custody

[ Read More ]

Beijing Internal Network Also A Victim Of Ransomware

Beijing is the favorite whipping boy of the Western powers when it comes to being accused of abusing its citizens, causing harm for the rest of the world through its espionage campaigns and maintaining its own army of blackhat elite hackers. However, the reality is China is as vulnerable a country to typical cyber attacks

[ Read More ]

Lack Of Policy Of Least Privilege Causes Cyber Attacks

The computer policy of the least privilege is not only an important principle but rather a critical piece of IT security precaution these days. Any organization should practice it, in order to lessen the possibility of unauthorized access or stolen account causing trouble for a system, especially in cloud-based apps and critical IT infrastructures. This

[ Read More ]

Swiss Government Wants its E-Voting System to be ‘Hacked’

Want to earn quick cash? Then accept the invite of the Swiss government, as they are offering $30,000 reward whoever can hack their e-voting system. The pen test challenge are both open for companies, groups and individuals, with the successful party earning $30,000 in cold cash. “The e-voting system is the first Swiss system that

[ Read More ]

Attempted Cyber Attack on Australian Parliament

Australia’s security agencies are investigating a likely cyber-attack attempt on the Federal Parliament’s computer system. It is alleged that the government believes that some foreign government is behind the attack. The hackers were caught in the early stages of gaining access to the system because the authorities didn’t find any loss of data, but signs

[ Read More ]

How to Protect Your Website From a Cyber Attack

Your website is your calling card to attract customers, and an unexpected cyber-attack can cost you both time and money. What types of activity are you monitoring from the back end? With the right tools, your website can increase its security and prevent an attack. To avoid becoming the next victim, it’s time to take

[ Read More ]

Use Security Technology to Improve Business Operations

Security technology would continue to be as important for businesses in 2019 as it was in 2018; in fact, it would be much more important in 2019 than it was in 2018. As we know, security technology today is integral to business operations and contributes greatly to the continuity of any business and its operational

[ Read More ]

How to Protect Mid-Tier Enterprises from Cyberattacks in 2019

The new year has begun; here comes another New Year Special from The Threat Report. Today, we take a look at how mid-tier enterprises can protect themselves from all kinds of cyberattacks- known as well as unknown ones. 2018 saw mid-tier enterprises facing lots of cybersecurity challenges, with hackers seeking to exploit all kinds of

[ Read More ]