North Korea flag is depicted on the screen with the program code

North Korean Hackers Exploit Internet Explorer to Spread RokRAT Malware

In a strikingly recent cyber onslaught, North Korean hackers are leveraging unpatched vulnerabilities within Internet Explorer to deploy the formidable RokRAT malware against targets in South Korea. This campaign is the latest example of the ongoing technological arms race where cybercriminals utilize known security flaws to bypass defenses. The exploitation tactics include malicious Word documents…

Read More
Cyber security

Revealing the Flaw: Inconsistent Session Management Plagues Popular Application

In January 2023, a critical vulnerability surfaced in the respected application SDK, specifically impacting its user setup functionalities. The exploit centered on inconsistent session management, allowing unauthorized users to change the first and last names of other users if they managed to guess their User IDs, exposing sensitive account information in the process. The vulnerability,…

Read More

Critical Infrastructure Under Attack: A New Cybersecurity Threat Emerges

A newly identified group of hackers known as “Montalto” has specifically targeted U.S. critical infrastructure, launching a series of cyberattacks with alarming sophistication. Researchers from Recorded Future have uncovered their operations focusing on highly sensitive sectors, raising significant concerns about the security of essential services. Montalto’s tactics involve exploiting vulnerabilities in key systems to gain…

Read More

Tutanota Faces DDoS Barrage While Vowing Privacy Protection

In an alarming week for Tutanota, the secure email provider reported multiple Distributed Denial of Service (DDoS) attacks that disrupted its system. Despite the onslaught aimed at overwhelming their services, Tutanota reassured its users that no personal data had been compromised. Their proactive response involved implementing the necessary security measures to mitigate the attacks while…

Read More