'

CISA Details Cloud-Focused Attack Techniques Used by APT29

CISA Details Cloud-Focused Attack Techniques Used by APT29

The United States government and several of its allies are warning organizations about new and evolving tactics being used by APT29, one of the more mature and active threat groups, to target cloud services and gain access to sensitive data. APT29, also known widely as Cozy Bear, is a group associated with the Russian SVR … Read more

Categories duo

Nation-State Threat Actors Hit Change Healthcare

Nation-State Threat Actors Hit Change Healthcare

Health insurance company UnitedHealth Group said it is responding to a cyberattack by a nation-state threat actor impacting the IT systems of its Change Healthcare subsidiary. According to a filing with the SEC last week, UnitedHealth said it found out on Feb. 21 that the actors gained access to some of Change Healthcare’s systems. After … Read more

Categories duo

Beware That Anonymous Sudan Is Promoting A New DDoS Botnet

Beware That Anonymous Sudan Is Promoting A New DDoS Botnet

It has come to light that a group known as Anonymous Sudan is actively promoting a new Distributed Denial of Service (DDoS) botnet service named “Skynet-GodzillaBotnet.” An advertisement circulating online showcases a red dragon logo with the word “SKYNET.” The service is being marketed as a powerful tool for executing DDoS attacks, with the group … Read more

Scattered Spider: Advanced Techniques for Launching High-Profile Attacks

Scattered Spider: Advanced Techniques for Launching High-Profile Attacks

Scattered Spider is a threat group responsible for attacking several organizations since May 2022 by using techniques like social engineering, ransomware, extortion, SIM Swapping and many other tactics. There were also reports that this threat group was affiliated with the BlackCat ransomware since mid-2023. Their most notable attacks that made it to the media include … Read more

8220 Hacker Group Attacking Linux & Windows Users to Mine Crypto

8220 Hacker Group Attacking Linux & Windows Users to Mine Crypto

In a significant escalation of cyber threats, the 8220 Gang, a notorious Chinese-based hacker group, has intensified its attacks on cloud-based infrastructure, targeting both Linux and Windows users to mine cryptocurrency. This latest campaign, from May 2023 through February 2024, marks a concerning advancement in the group’s tactics and poses a heightened risk to cloud security worldwide. Document Live Account Takeover Attack Simulation How do Hackers Bypass 2FA? Live attack simulation Webinar … Read more

New DDoS malware Attacking Apache big-data stack, Hadoop, & Druid Servers

New DDoS malware Attacking Apache big-data stack, Hadoop, & Druid Servers

Concerning a development for organizations leveraging Apache’s big-data solutions, a new variant of the Lucifer DDoS botnet malware targeting Apache Hadoop and Apache Druid servers has been identified. This sophisticated malware campaign exploits existing vulnerabilities and misconfigurations within these systems to execute malicious activities, including cryptojacking and distributed denial-of-service (DDoS) attacks. Document Live Account Takeover … Read more

HackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security Community

HackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security Community

HackerGPT is a cutting-edge AI tool designed explicitly for the cybersecurity sector, particularly beneficial for individuals involved in ethical hacking, such as bug bounty hunters. This advanced assistant is at the cutting edge of cyber intelligence, offering a vast repository of hacking methods, tools, and tactics. More than a mere repository of information, HackerGPT actively … Read more