Tag: EN

North Korean Hackers Attacking macOS Using Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code. All these documents contain malicious code or macros, often disguised as familiar files, which help hackers gain unauthorized access and deliver malware to…

Go Ninja – 4,999,001 breached accounts

In December 2019, the now defunct German gaming website Go Ninja suffered a data breach that exposed 5M unique email addresses. The impacted data included usernames, email and IP addresses and salted MD5 password hashes. More than 4M of the…

Locking down Industrial Control Systems

SANS unveils online hub with valuable tools and information for cybersecurity professionals defending ICS Sponsored Post  Industrial Control Systems (ICS) which can automate processes, increase productivity and reduce labour costs, are rapidly gaining worldwide enterprise traction.… This article has been…

DarkCasino WinRAR Exploit: A New APT Threat Emerges

In a recent cybersecurity revelation, a formidable and highly sophisticated cyber threat has surfaced, going by the name DarkCasino. Initially perceived as a phishing campaign orchestrated by the EvilNum group, recent analyses by cybersecurity firm NSFOCUS have reclassified DarkCasino as…