Cyber Threat Hunting

Welcome to CyberHunting.com web page, a community of security researchers. Providing information related to cyber threat hunting, penetration testing, bug

Read more

CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats

In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive

Read more

Cross-chain protocol Multichain bug gets exploited for $1.34 million

Quick Take A bug in cross-chain protocol Multichain has been exploited for $1.34 million, according to researchers. While the bug

Read more

Destructive malware targeting Ukrainian organizations

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine. This malware

Read more

Cyberattack takes down Ukrainian government websites

Ukrainian government servers were hit by a “massive cyberattack” overnight that saw government websites taken down, including the homepage for

Read more

A Brief History of the Cybersecurity Profession

Cybersecurity careers are in high demand, but a closer look at the timeline of network technology and the Internet reveals

Read more

Phishers Now Impersonate Pfizer to Target Victims

Cybercriminals are now launching a highly targeted phishing campaign impersonating Pfizer. The goal of these phishing emails seems to be

Read more

Use of blockchain technology could increase human trust in AI

AI is a new generation technology where machines and information systems demonstrate a form of intelligence that simulates the natural

Read more

We Can Neither Regulate Nor Sanction Away Cryptocurrency’s Facilitation of Ransomware

Interesting article from ISACA. If you are interested to learn what happen to the Colonial pipeline ransomware attack. This is

Read more