On Tuesday, the German federal criminal police department, known as Bundeskriminalamt, announced that they have dismantled servers belonging to the Russia-based darknet market Hydra. Additionally, the forces have also confiscated bitcoin resources worth 25 million euros ($25 million).
In the official statement, the authorities revealed that the joint operation that dates back to August 2021…    
    
The OSI model: What it is and how you can use it
April 5, 2022
Developed by the International Organization for Standardization (ISO) in 1984 when network computing was at its nascent stage, the Open Systems Interconnection (OSI) model is the visual representation of how information interacts with different mediums—hardware and software components—within a network. OSI is a framework for vendors to standardize the interoperability between devices and…    
    
Deep Panda, the advanced persistent threat group, has launched new attacks using Log4shell to deploy the new Fire Chili rootkit. Known as Shell Crew, KungFu Kittens, and Bronze Firestone, Deep Panda has been one of China’s most infamous nation-state threat actors.
Recently, a report published by researchers Rotem Sde-Or and Eliran Voronovitch stated that the group has mainly attacked…    
    
Lapsus$, an infamous cybercrime gang, had previously breached high-profile companies such as Microsoft, NVIDIA, and Samsung. Recently they claimed responsibility for the data breach targeting Globant, a Luxembourg-based software service company, thereby announcing their return after a brief ‘vacation’.
An message regarding the attack was shared on Lapsus$’ official Telegram…    
    
The establishment of an annual discussion between Singapore and the United States was announced on Tuesday (Mar 29) as part of bolstering cybersecurity cooperation.
Singapore Prime Minister Lee Hsien Loong is in the United States on a working visit. After attending a meeting in the White House, Singapore Prime Minister Lee Hsien Loong and US President Joe Biden released a joint…    
    
Ukrtelecom has been targeted by a "powerful" cyberattack
March 29, 2022
Ukrtelecom, Ukraine’s largest fixed-line telecommunications firm, has been targeted by a “powerful” cyberattack. It is considered to be the most lethal cyberattack since the Russian invasion began in February, and it has brought the company’s services across the country to a halt.
Ukrtelecom CEO Yuriy Kurmaz said in a statement that a powerful hostile cyber attack was…    
    
On friday (March 25), the US Federal Communications Commission (FCC) included Russian cybersecurity company Kaspersky Labs, and Chinese communication firms China Telecom (Americas) Corp and China Mobile International USA Inc. to its list of service providers and communications equipment that can potentially threaten US national security.
The official advisory released by FCC stated that…    
    
Gartner warns Midsize Enterprise CIOs
March 25, 2022
According to Gartner, many of the security concerns that MSEs face are similar to those that larger enterprises face. The rising usage of cloud applications, open-source code, the internet of things (IoT), and cyber-physical systems, for example, has increased attack surfaces. As a result of this, MSE administrators will have to secure a more complicated organizational environment.
The…    
    
On 24th March (Thursday), Google’s threat analysis group (TAG) released a statement that disclosed details about the activity of two North Korean based hacker groups, who had exploited Chrome’s zero-day vulnerability to target several fintech, news media, IT and cryptocurrency firms.
Previously, the attackers carried out two campaigns, namely Operation Dream Job and Operation Apple…    
    
Researchers have discovered a new phishing tactic
March 24, 2022
Passwords and other sensitive information can now be easily obtained using a variety of phishing methods. However, a new phishing tactic known as the BitB attack has recently been uncovered, and it is so perfectly crafted that most people would fall for it.
This method entails creating a bogus pop-up login window that displays on a website. By combining HTML with CSS, threat actors create a…    
    

