// ATTACKS

// АТАКИ

3 articles
All Zero-Day Ransomware Phishing Supply Chain AI Security Data Breaches Malware Vulnerabilities Attacks Security
Alabama man pleads guilty to hacking, extorting hundreds of women

A 22-year-old from Alabama pleaded guilty to hacking and extorting hundreds of women by hijacking their social media accounts. This represents an actual criminal incident involving computer fraud, cyberstalking, and extortion targeting multiple real victims.

Why 'Call This Number' TOAD Emails Beat Gateways

This article describes an active email attack technique where threat actors bypass email gateways by sending messages containing only phone numbers, directing recipients to call for fraudulent purposes. This represents a real, documented attack method being used in the wild to circumvent security controls.

Google Disrupts Chinese Hackers Targeting Telecoms, Governments

Google disrupted an active cyberespionage campaign by Chinese threat actor UNC2814 that has been targeting telecommunications companies and government organizations across 42 countries since at least 2017. This represents an actual hacking incident involving real targets and threat actor disruption.