DNS Attacks into limelight again

DNS Attacks into limelight again

DNS infrastructure always remains an attractive target for cyber attackers and some recent targeted attacks on DNS highlight the increasingly sophisticated attack techniques used by hackers. New ways Attackers often…
Apple 🍏 Removes Controversial Feature

Apple 🍏 Removes Controversial Feature

Apple has removed a controversial feature from its macOS operating system that allowed the company's own first-party apps to bypass content filters, VPNs, and third-party firewalls. Called "ContentFilterExclusionList," it included…
Windows Finger Command Abused

Windows Finger Command Abused

Attackers are using the normally harmless Windows Finger command to download and install a malicious backdoor on victims' devices. The 'Finger' command is a utility that originated in Linux/Unix/Windows operating…
Winnti ..APT 41 in action

Winnti ..APT 41 in action

A series of attacks by a threat actor of Chinese origin that has targeted organizations in Russia and Hong Kong with malware including a previously undocumented backdoor. APT used LNK…
Vulnerability in BIG IP F5 CVE 2020-27716

Vulnerability in BIG IP F5 CVE 2020-27716

The security flaw was discovered by a researcher , certain versions of BIG-IP Access Policy Manager (APM), a secure access solution that simplifies and centralizes access to applications, APIs and…
DarkNet Raided … Seized

DarkNet Raided … Seized

Europol cops have taken down the largest dark-web souk DarkMarket, after arresting an Australian citizen living in Germany who they claim was operating the world's biggest online bazaar of its…