// ATTACKS

// АТАКИ

3 articles
All Zero-Day Ransomware Phishing Supply Chain AI Security Data Breaches Malware Vulnerabilities Attacks Security
Why 'Call This Number' TOAD Emails Beat Gateways

This article describes an active email attack technique where threat actors bypass email gateways by sending messages containing only phone numbers, directing recipients to call for fraudulent purposes. This represents a real, documented attack method being used in the wild to circumvent security controls.

Google Disrupts Chinese Hackers Targeting Telecoms, Governments

Google disrupted an active cyberespionage campaign by Chinese threat actor UNC2814 that has been targeting telecommunications companies and government organizations across 42 countries since at least 2017. This represents an actual hacking incident involving real targets and threat actor disruption.

Romanian Hacker Pleads Guilty to Selling Access to US State Network

Romanian hacker Catalin Dragomir pleaded guilty in US court to selling unauthorized access to an Oregon state government office's network. This represents an actual hacking incident involving a real victim (Oregon state government) and criminal activity.