The FBI and the Justice Department have declared a global effort to disrupt and dismantle the Qakbot infrastructure, which is utilized in ransomware attacks. More than 700,000...
The Five Families unites the underground internet world, adopting the name of the 1950s-60s New York mafia’s Italian-American clans. This new group of “Five Families” involves...
A vulnerability affecting Apache RocketMQ servers was publicly disclosed in May 2023, allowing remote code execution through a gateway. RocketMQ is a cloud-native platform for messaging...
Recent reports reveal that Smoke loader botnets are used by malicious actors to infiltrate compromised systems and deploy Wi-Fi scanning executables. This Wi-Fi scanning tool seems...
The popular language learning platform has come under scrutiny as a post on a hacker’s forum offers access to information from 2.6 million customer accounts for...
A recent discovery highlights a significant QR code phishing campaign that targets Microsoft credentials across various industries. Notably, a major energy company based in the US is at...
Welcome to Cyber Writes’ weekly Threat and Vulnerability Roundup, where we provide the most recent information on cybersecurity news. Take advantage of our extensive coverage and...
This year’s Hack-A-Sat competition challenged teams to hack into an actual satellite in orbit. The US Air Force Moonlighter, which was launched especially for the event, was the...
Welcome to Cyber Writes’ weekly Threat and Vulnerability Roundup, where we provide the most recent information on cybersecurity news. Take advantage of our extensive coverage and...
Threat actors are known to use several methods to lure victims into their websites and make them download their malicious payload, which will allow them to...
Recent Comments