KEEPNET LABS > Cyber Security > Cyber attack

Blog

  • Covert redirect attacks and how to get protected against them

    Open redirects fail to determine whether the redirected URL is valid. Cybercriminals exploit this flaw by opening a fake login window, stealing login information, and redirecting to a malware-infringing page. This type of phishing attack was first discovered in June 2014 by Wang Jing at Nanyang University of Technology.

  • How Effective Is Security Training in Preventing Cyber Attacks?

    A phishing attack is responsible for more than 91% of system breaches. Spear phishing, a targeted attack against a specific individual, has become popular. Organizations require employee awareness training as well as a combination of technical solutions to protect against email cyber-attacks.

  • The last hunt of social engineering: Uber

    A young hacker allegedly broke into Uber’s network last week using social engineering attacks. He gained access to a staff member’s Slack login and utilized it to inform Uber staff that there had been a data breach. Uber noticed this and within hours, it published additional facts quickly confirming the hack on Twitter. Uber asserts […]

  • Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war

    An advanced weapon is emerging that uses data analysis to hone systems and suppress attacks. Darktrace’s artificial intelligence solutions can help companies restrict access to APIs, neutralize shady IT, protect supply chains and even improve the efficiency of DEVSECOPYRIGHTs.

  • General Bytes Suffer Cyberattack

    A cyberattack took advantage of a previously unknown flaw in General Bytes software. CAS allows businesses to manage Bitcoin ATMs from a centralized location via a desktop computer or a browser on a mobile device.

  • Friday Squid Blogging: The Language of the Jumbo Flying Squid

    The giant flying squid (Dosidicus Gigas) shows 12 different pigmentation patterns in different sequences, similar to how humans arrange words in a sentence. Researchers suggest that these pigmentation changes in the body signal a definite action, such as “I’m about to attack”.

  • USB “Rubber Ducky” Attack Tool

    Rubber Ducky can inject commands that a USB device will inject into the target machine. DuckyScript 3.0 is a feature-rich language that allows users to write functions and store variables. It can perform a test to check whether a device is connected to a Windows or Mac computer.

  • Recovery From NHS Attack Could Take Weeks

    Advanced, a key IT partner of the NHS, was attacked by ransomware last week. Company said it could take three to four weeks for systems to resume normal operation. Advanced manages many important systems in the health sector including the NHS 111 and other emergency departments. The UK government downplayed the severity of the incident.

  • 7-Eleven Stores in Denmark Close After Cyberattack

    Denmark’s 7-Eleven stores closed yesterday after a cyber attack. Pay and order systems disrupted in stores across the country. Cyber attack took place in the early morning of August 8, company said it was probably a ‘hacker attack’, according to Facebook post.

Join
Our Newsletter

Sign up to learn about the latest threats, hacking methods, and news.