Parrot TDS (Traffic Direction System) has infected various web servers hosting more than 16,500 websites, ranging from adult content sites, personal websites, university sites, and local government sites. The situation discovered by Avast and is currently being used to run a campaign called FakeUpdate that distributes the NetSupport Remote AccessContinue Reading

For many years, we are using vulnerability scanners to identify security weaknesses and flaws in our internet facing environment. A vulnerability scan is an automated process and critically important for organizations to see what vulnerabilities they have and attackers can use if they target them. Despite all this success, widespreadContinue Reading

Everything started with a post of Lapsus$ Telegram group including screenshots of Okta’s admin panel. We shared the news as asking whether Okta hacked? An update about the incident came from David Bradbury, the CSO of Okta as “the Okta service has not been breached and remains fully operational. ThereContinue Reading

Since December, we are reading about the actions of Lapsus$. Samsung, Nvidia, and Ubisoft were some of their victims. Analysts suspecting that some of the members of the group are from South America, and some of them from Europe. Lastly, the group shared a screenshot on their Telegram channel thatContinue Reading

As the sanctions against Russia gradually increased, we saw that technology companies also participated in these sanctions at a large rate. Meanwhile, cyber attacks against Russia continue with all their violence by different threat actors. Against these sanctions and threats, different measures stand out on the Russian side. Sberbank, oneContinue Reading

While the whole world is dealing with the ongoing cyber war with the land war between Russia and Ukraine, the Iranian threat group TEMP.Zagros (aka MuddyWater) has been attributed to a new swarm of attacks targeting Turkey and the Arabian Peninsula with the goal of deploying remote access trojans (RATs)Continue Reading

On 27th of February, a member of Conti threat group started leaking data from the group, after Conti group announced that they are fully supporting Russia against Ukraine. Leakage process is still going on via “ContiLeaks” Twitter account. Leakage started with unencrypted chat messages between Conti members. On 1st ofContinue Reading

After increasing attacks to Ukraine day by day, last week, Ukraine asked IT pros to help defending its IT infrastructure and attack specific targets. In recent days, we have seen anonymous declared that they are supporting now Ukraine and also several attacks to Russia from volunteers supporting Ukraine. Cyberpolice ofContinue Reading