Recent AD News

Germany dismantles Russian darknet server; Seizes bitcoin worth $25 million

On Tuesday, the German federal criminal police department, known as Bundeskriminalamt, announced that they have dismantled servers belonging to the Russia-based darknet market Hydra. Additionally, the forces have also confiscated bitcoin resources worth 25 million euros ($25 million). In the official statement, the authorities revealed that the joint operation that dates back to August 2021…
Read more
Active Directory Fundamentals

The OSI model: What it is and how you can use it

Developed by the International Organization for Standardization (ISO) in 1984 when network computing was at its nascent stage, the Open Systems Interconnection (OSI) model is the visual representation of how information interacts with different mediums—hardware and software components—within a network. OSI is a framework for vendors to standardize the interoperability between devices and…
Read more
Recent AD NewsUncategorized

Chinese hackers exploit log4j to target VMWare Horizon servers

Deep Panda, the advanced persistent threat group, has launched new attacks using Log4shell to deploy the new Fire Chili rootkit. Known as Shell Crew, KungFu Kittens, and Bronze Firestone, Deep Panda has been one of China’s most infamous nation-state threat actors. Recently, a report published by researchers Rotem Sde-Or and Eliran Voronovitch stated that the group has mainly attacked…
Read more
Recent AD News

Lapsus$ gang 'back from vacation' with a 70 GB data breach

Lapsus$, an infamous cybercrime gang, had previously breached high-profile companies such as Microsoft, NVIDIA, and Samsung. Recently they claimed responsibility for the data breach targeting Globant, a Luxembourg-based software service company, thereby announcing their return after a brief ‘vacation’. An message regarding the attack was shared on Lapsus$’ official Telegram…
Read more
Recent AD News

Russia's Kaspersky and China's telecom firms join US' National Security threat list

On friday (March 25), the US Federal Communications Commission (FCC) included Russian cybersecurity company Kaspersky Labs, and Chinese communication firms China Telecom (Americas) Corp and China Mobile International USA Inc. to its list of service providers and communications equipment that can potentially threaten US national security. The official advisory released by FCC stated that…
Read more
Recent AD News

North Korean hackers use Chrome's zero-day to attack fintech, crypto and media firms

On 24th March (Thursday), Google’s threat analysis group (TAG) released a statement that disclosed details about the activity of two North Korean based hacker groups, who had exploited Chrome’s zero-day vulnerability to target several fintech, news media, IT and cryptocurrency firms. Previously, the attackers carried out two campaigns, namely Operation Dream Job and Operation Apple…
Read more
Recent AD News

FBI sees Russian hackers eyeing US energy firms

Amidst the ongoing Ukraine-Russia war, the FBI has disclosed that there is a growing amount of interest shown by Russian hackers in US-based energy firms, although there are no signs of a cyberattack being planned for the time being. The FBI advisory accessed by Associated Press on Tuesday (March 22) also revealed that the Russian cyberattackers have examined atleast five energy companies for…
Read more
Recent AD News

Ransomware-as-a-Service group targets critical US assets

In a recently released cybersecurity advisory, the FBI revealed that Avoslocker, the Ransomware-as-a-Service group that surfaced in mid-2021, was responsible for targeting US-based critical infrastructure across multiple sectors. The statement was jointly authored by the US Treasury Department and the Financial Crimes Enforcement Network (FinCEN). The press release also shed light on the modus…
Read more
Recent AD News

Phishing has become more untraceable with this novel technique

A new UI redressing technique, know as Browser In The Browser (BITB), has given phishing a shot in the arm by making such attacks nearly untraceable in their design. This method is used to steal login credentials by juxtaposing a realistic replica of a third-party SSO login window that is usually redirected by a website’s login page (Instagram, Facebook, Twitter etc.). For instance, if a…
Read more
Recent AD News

Cybercriminals use Russia-Ukraine war to execute cryptocurrency scams

Cryptocurrency funding has become a viable way to support Ukraine in its ongoing war against Russia, which has left the country devastated on all fronts. According to UK based blockchain analysis provider Elliptic, the Ukrainian government, along with an NGO that provides military support, have raised a sum of $63.8 million through over 120,000 crypto asset donations since the beginning of the…
Read more