Saturday , March 1 2025

Recent Posts

Hackers Abuses Cloudflare Tunnels to Deliver malware

flowchart

Proofpoint is monitoring a group of cybercriminals using Cloudflare Tunnels to distribute malware. They are exploiting the TryCloudflare feature to create one-time tunnels without needing an account. Tunnels allow remote access to data and resources not on the local network, similar to using a virtual private network (VPN) or secure …

Read More »

1M domains at risk of ‘Sitting Ducks’ domain hijacking

duck

More than a dozen threat actors are using a strong attack method in the domain name system (DNS). These hackers can take control of domain names without the owners realizing, and then use them for harmful activities. Infoblox, an IT automation and security company, cautions about this risk. The “Sitting …

Read More »