Tag: CySecurity News – Latest Information Security and Hacking Incidents

Where Hackers Find Your Weak Spots: A Closer Look

Social engineering is one of the most common attack vectors used by cyber criminals to enter companies. These manipulative attacks often occur in four stages:  Info stealing from targets Building relationships with target and earning trust Exploitation: Convincing the target…

MITRE Breach: State Hackers Exploit Ivanti Zero-Days

A state-backed hacking group successfully breached MITRE Corporation’s systems in January 2024 by exploiting two Ivanti VPN zero-day vulnerabilities.  The incident was detected after suspicious activity was observed on MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified collaborative…

Rise In Cybercrime: Dark Web Fueling Credential Attacks

  In an unsettling situation, cybercriminals are increasingly turning to credential theft as a lucrative business, aided by the rise of infostealer malware attacks. Over the past three years, these threat actors have capitalised on the opportunity, compromising millions of…