Attacks

Hackers Now Use Their Own Admin Tools Against Company Networks

As if the threatscape couldn’t hold any more danger, IT teams must now add their favorite network administration tools as possible backdoor entry points for hackers. Hackers have found a way to abuse LDAP, Kerberos, and NTLM, take over WMI and DCE/RPC, two popular network admin tools, to get admin privileges. After an initial infection

[ Read More ]

Why Cyber Attacks Are Now The Biggest Risk To The World

In the recent World Economic Forum 2018, The Global Risk Report has identified the highest risk on a global level. Experts have determined the possible impact on the geopolitical and economic status of cyber-attacks. It is believed that major attacks may occur in the next five years. Its effect was associated similar to natural disasters

[ Read More ]

Hackers Love The EternalBlue Exploit Because You Hate It

There is one thing small-time hackers and heavy-hitting black hats have in common—they both love the exploit known as EternalBlue. Evolved from the famous computer worms Conficker and Welchia, EternalBlue employs diverse exploits with new, brilliant-devised, and easy to deploy applications. As a hacker favorite, it leaves digital devastation in its wake while taking advantage of any unpatched

[ Read More ]

Pawned: People Who Got Hacked Tell Their Stories

We hear about various hacks through the news, and most of the time, we only tend to remember the statistics about how many accounts were affected, what details were leaked, and how much loss the company faced in the form of dollar bills. But honestly, these stories don’t hold much of a human appeal—and they

[ Read More ]

Do You Understand The Vulnerabilities Of Cryptocurrencies Yet?

Another story of hacking cryptocurrency happened in Tokyo last January of this year. Hackers were able to take nearly $500 million digital tokens. It is considered to be one of the biggest crime in the history of cyrptocurrency. The incident has raised many speculations regarding the stability of cryptocurrency in the world. Method of hacking

[ Read More ]

Hackers Launch New Attacks Using Old Adobe Vulnerability

A known critical vulnerability in the Adobe Flash Player can serve as a gateway for cybercriminals to hijack your computer. Researchers from cyber security research group Morphisec spotted the vulnerability in use in a phishing campaign using Word documents. This is the second time this vulnerability code named CVE-2018-4878 appears as a tool for an

[ Read More ]