Suspected cyber attack cripples box terminal run by Jawaharlal Nehru

Built-in clause for new private cargo terminals to renew concession period JNPCT is not accepting vessels alongside due to outage of the system and has diverted one vessel A suspected cyber-attack of the management information system (MIS) has crippled the container terminal run by the state-owned port authority at Jawaharlal Nehru Port from Monday, forcing […]Read More

6 Best OSINT Tools for Penetration Testing Attribution link

When it comes to penetration testing, having the right tools is essential. And Open-Source Intelligence (OSINT) tools can be a gold mine with loads of information to offer that make penetration testing essential. We’ll be looking at the six best OSINT tools and how they can help with penetration testing. Penetration testing basics: Among all […]Read More

EvilPlayout: Attack Against Iran’s State Broadcaster

In the past few months, a new wave of cyberattacks has been flooding Iran. These attacks are far from minor website defacements – the recent wave is hitting national infrastructure and causing major disruptions to public services. This article provides an in-depth technical analysis of one of the attacks against the Iranian national media corporation, […]Read More

DDoS attacks hit Ukrainian government websites

Kyiv, Ukraine—A powerful Distributed Denial of Service (DDoS) attack hit Ukraine Tuesday, targetting the websites of the country’s armed forces, defense ministry, public radio and two biggest national banks—Privatbank and Oschadbank—and knocking some services offline. The attack, which worked by flooding the sites with an overwhelming amount of web traffic, left many Ukrainians unable to […]Read More

Hackers Attach Malicious .exe Files to Teams Conversations

Microsoft Teams continues to grow in popularity. Teams counts 270 million monthly active Teams users; that’s up a tidy 20 million from July 2021. As this popularity grows, hackers will continue to increase how often they target it as a launchpad for phishing and malware attacks. Starting in January 2022, Avanan observed how hackers are dropping […]Read More

Geomagnetic storm takes out 40 of 49 brand new Starlink

SpaceX launched even though the space weatherman predicted tricky conditions could follow a solar flare SpaceX last week launched 49 shiny new Starlink broadband-beaming satellites, which is good. But 40 of them have already, or will shortly, meet their demise due to a geomagnetic storm that struck a few days after their ascent. Which is […]Read More

Report Details Russian Cyberespionage Efforts in Ukraine

Russian President Vladimir Putin (Photo: Dimitro Sevastopol/35 images via Pixabay) In a report published Monday, Symantec’s Threat Hunter Team outlines a specific Russian cyberespionage campaign conducted on a Ukrainian network in 2021. This comes as Russia has amassed 100,000 or more troops at Ukraine’s eastern border while it reportedly mulls invasion. See Also: Case Study: The Road to […]Read More

The Battle for the World’s Most Powerful Cyberweapon

In June 2019, three Israeli computer engineers arrived at a New Jersey building used by the F.B.I. They unpacked dozens of computer servers, arranging them on tall racks in an isolated room. As they set up the equipment, the engineers made a series of calls to their bosses in Herzliya, a Tel Aviv suburb, at […]Read More

Report: DHS Fears Russian Cyberattack If US Acts on Ukraine

The U.S. Department of Homeland Security is reportedly warning that the U.S. could witness a retaliatory cyberattack at the hands of Russia if it decides to respond to the latter’s potential invasion of Ukraine, where 100,000 or more troops have been amassed for weeks. See Also: Live Discussion | The Toll of Identity Sprawl in the […]Read More

Destructive malware targeting Ukrainian organizations

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine. This malware first appeared on victim systems in Ukraine on January 13, 2022. Microsoft is aware of the ongoing geopolitical events in Ukraine and surrounding region and encourages organizations to use the information in this post to proactively protect […]Read More