How to Perform Forensic Investigation on Unitronics HMI/PLCs Devices using...
Since at least October 2023, an Iran-based threat actor who goes by the name “CyberAv3ngers” hacked Israeli PLCs in water, energy, shipping and distribution sectors that made devastating damage on the...
View Article77th Independence Anniversary Greeted with Multiple Defaced websites by Hackers
With India celebrating their 77th Independence day today, there were many hacktivists groups that have attacked several organizations in India. The cyberattacks against the organizations were...
View ArticleRansom Extortion Campaign attacks 110,000 Domains with Leaked Environment...
Hackers have been found to be targeting cloud environments due to their heavy usage by organizations and the sensitive information that is stored. A recent campaign has been discovered in which the...
View ArticleAnonymous dismantles Pedophile Platform in Dark Web : “On behalf of Every...
Anonymous is a group of hacktivists that were responsible for several large-scale operations against the Government, Dark Web, Child Pornography and many other social causes including hacking into...
View ArticleToyota Confirms a Data Breach of 240 GB Sensitive Data that was Sold in...
Toyota has been faced with a large data breach after a threat actor has posted about the sale of data in an underground forum. The data accounts to a size of 240 GB according to the post. The leaked...
View ArticleALBeast Vulnerability: 15,000 Web Apps Vulnerable to Exposure due to an AWS...
A new vulnerability named “ALBeast” has been discovered in AWS ALB authentication feature. It could allow a threat actor to bypass authentication and authorization in applications that use AWS ALB...
View ArticleXiaomi Patched an RCE Vulnerability Before Pwn2Own Toronto 2023 and Removed...
During the Pwn2Own Toronto 2023 Competition, there were several categories and devices that were listed for researchers to target. As for Mobile devices, there were Apple iPhone 14, Google Pixel 7,...
View ArticleSoftware Supply Chain Threat Landscape July 2024: PyPI, NPM, GitHub and macOS
Software Supply Chain is an easy and a massive target for threat actors due to the use of open-source software packages in several organizations. In July 2024, there were several supply chain attacks...
View ArticlePwn2Own Toronto Was NOT THE FIRST! Xiaomi Has Done it Before!
Few days ago, we shared a news about Xiaomi patching Xiaomi 13 Pro devices at the Pwn2Own Toronto 2023 competition. The patching was done specifically on all the loopholes that were about to be...
View ArticleHackers can Even Access a “Cockpit of an Aircraft” with an SQL injection
Airports have separate security lines for Known Crewmember (KCM). KCM is a TSA (Transport Security Administration) program that will have a special lane for pilots and flight attendants. This allows...
View Article