Source: https://www.cshub.com/attacks/articles/ddos-attacks-are-the-most-impactful-threat-vector-in-apac According to a survey conducted by Cyber Security Hub, 28 percent of cyber security professionals in the Asia-Pacific…

Introducing Dark Nexus, Emerging IOT Malware
The fact that dark_nexus is built on the foundations of Mirai and Qbot is proof of the evolving tactics of botnet operators and inexperienced hackers alike, allowing them to add new functionality by exploiting a variety of vulnerabilities in poorly secured IoT devices and amass modern botnet armies.

How Hackers Are Accessing Everyones Zoom Meetings
Each Zoom conference call is assigned a Meeting ID that consists of 9 to 11 digits. Naturally, hackers have figured out they can simply guess or automate the guessing of random IDs within that space of digits.

Analysis of 1,300 Phishing Campaigns Shows Significant Sector Differences
…however once a user had been fooled into clicking the link, half were likely to enter credentials regardless of what sector they worked in.

Middle East Industry Falls Prey To New Targeted Malware Campaign
“According to our telemetry, the Milum Trojan was exclusively used to attack targets in the Middle East from at least the end of May 2019.”

Microsoft Warns of Windows-7 Zero Day Vulnerability
Despite affecting all Windows versions, the vulnerability is most lethal on Windows 7 where it can allow an attacker to remotely execute code if exploited…