Grandstream and DrayTek Devices Exploited to Power New Hoaxcalls DDoS Botnet

As soon as the proof-of-concept (PoC) for CVE-2020-8515 was made publicly available in March, this vulnerability was employed by a new DDoS botnet for propagation.

In COVID-19 Scam Scramble, Cybercrooks Recycle Phishing Kits

Old phishing kits are being pressed into service to keep up with the unprecedented volume of new scams that exploit the pandemic.

Phishers Try 'Text Direction Deception' Technique to Bypass Email Filters

Scammers can be pretty innovative when it comes to finding new ways to sneak phishing messages past secure email gateways and other filtering mechanisms.

Cybercriminals targeting Zoom, Google and Teams domains

The increased video conferencing activity due to COVID-19 has given cybercriminals the opportunity to use typosquatting and URL hijacking by imitating many of the top conferencing platforms.

Coronavirus: Microsoft directly warns hospitals, 'Fix your vulnerable VPN appliances'

Microsoft says it has issued its first-ever targeted warning to several dozen hospitals, alerting them to vulnerabilities in their VPN appliances after spotting a ransomware gang targeting them.

North Korean hackers reboot espionage operations following December takedown

Suspected North Korean hackers have been running a spearphishing email operation targeting people interested in North Korean refugees, according to new research from ESTsecurity.

FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic

The FBI has received multiple reports of conferences being disrupted by pornographic and/or hate images and threatening language.

COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware

Cybercriminals are taking advantage of the spike in usage by registering new fake "Zoom" domains and malicious "Zoom" executable files in an attempt to trick people into downloading malware.

Saudi spies tracked phones using flaws the FCC failed to fix for years

SS7, or Signaling System 7, is a set of protocols — akin to a private network used by carriers around the world — to route and direct calls and messages between networks.

Booz Allen analyzed 200+ Russian hacking operations to better understand their tactics

Booz Allen Hamilton has published a comprehensive report this week detailing 15 years (2004 to 2019) of cyber operations carried out by Russia's military hackers.
About Cyware

We help security professionals and organizations stay ahead of threats by providing the latest cybersecurity alerts, a free OSINT feed, and a suite of cyber fusion solutions for threat intelligence sharing, response, and security automation.

Trending Tags