Walkthrough: DNS Tunnel Attack (Detection and Measures)

We are happy to introduce our group project: DNS Tunnel Attack (Detection and Measures) This project has been completed by A S M Nazimuddoullah and FAHIM UDDIN In this project, we studied DNS functionalities, DNS tunneling attacks with their features, and different methods to detect DNS tunneling attacks. At the same time, we explored different …

Malicious AI-powered Cyber Threats: WormGPT

Artificial intelligence (AI) as we know it is growing in use at an exponential rate. Specifically, within the cybersecurity field, the rise of such AI technology simultaneously presents extraordinary opportunities and intimidating challenges. While AI can identify and exploit vulnerabilities easily, it introduces significant risks if it does not deploy its own set of security …

Network Sandbox: Creating a Secured Test Environment

Imagine a playground where you can build, break and rebuild without the fear of consequences! This is the essence of a Network Sandbox. Welcome to our project Network Sandbox: Creating a Secured Test Environment, executed by Maria, Kamaldeep and Achu. A sandbox is an isolated environment on a network that mimics end-user operating environments. They …

Cicada3301. The new trend in ransomware attacks

Can you imagine a situation where your data has been kidnaped by someone else? This is a very inconvenient position that a ransomware can bring to your computer or a whole company. Let’s analyze a new ransomware trend that seems to be very effective in multiple industries. What is ransomware? Let’s start by explaining what …

Ascension Healthcare: Yet Another Crippling Ransomware Attack

Hospitals and other healthcare organizations has been a lucrative target for threat actors since the dawn of ransomware attacks. This is primarily due to the volume of sensitive information stored in hospitals like Patients personal information, their medical records and access to diagnostic devices. Some of the industry experts believe that a patients medical and …

$44 Million Stolen from Crypto Platform in Singapore: A Growing Concern for Cryptocurrency Security

The fast-evolving world of cryptocurrencies continues to be plagued by security concerns, as demonstrated by the recent theft of $44 million from a Singapore-based cryptocurrency platform, BingX. BingX confirmed that on September 20th,2024. They detected abnormal network access, potentially indicating an attack on BingX’s hot wallet. The crypto platform discovered the illicit movements of funds …

Security Researcher Exposes Critical WHOIS Vulnerability

In Brief Benjamin Harris, CEO of watchTowrs, successfully manufacture fake HTTP certificates, tracked email activity, and execute code of his choice on thousands of servers for $20. He registered the domain dotmobregistry.net, which was previously the authoritative WHOIS server for .mobi. He observed the domain’s expiration and set up his own .mobi WHOIS server there, …

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

This article highlighted how researchers explore the security vulnerability in the Nexus Android botnet’s command and control (C&C) panel. This security researcher exploited the vulnerability of C&C panel by compromising the panel to gain valuable threat intelligence. The article also highlighted the model of mobile Appinjects, which is use to gain the knowledge of overlay …

Vulnerabilities in E2EE Cloud Storage

During ACM CCS 2024, held October 14-18, 2024, researchers from ETH Zurich, Jonas Hofmann and Kien Tuong Truong, indicated severe security flaws in the end-to-end encryption (E2EE) systems of several cloud storage service providers. These flaws can pose a significant threat to user information and undermine the promised security standards of those providers. The research …

Game Freak’s Teraleak

In a bizarre turn of events, Game Freak, the developer behind the popular Pokémon game series, has fallen victim to a massive cyberattack, resulting in the leak of decades of information. The leak, known as “Teraleak,” includes sensitive game-related details from the early days of Pokémon, such as unreleased content, game development assets, financial records, …