#1 Trending Cybersecurity News & Magazine

Friday, March 28, 2025
The Cyber Express
No Result
View All Result
Free Newsletter
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Tor Browser

    Tor Browser 13.5.14 Update Fixes Critical Security Flaw for Windows 7, 8, and 8.1

    Firefox vulnerability

    Firefox Patch Released as Mozilla Addresses Chrome-Like Security Threat

    Known Exploited Vulnerabilities Catalog

    CISA Issues Urgent Security Alerts: Critical Vulnerabilities in Schneider Electric, Chrome, and Sitecore

    Serbian Journalists

    Investigative Journalists in Serbia Hit by Advanced Spyware Attack

    Ingress-NGINX Controller

    Multiple CVEs Found in Ingress-NGINX—Patch Now to Prevent Cluster Compromise

    CVE-2025-26512

    SnapCenter Security Flaw Rated Critical—NetApp Urges Immediate Patch

    UAE Cyberattack

    634 Targets, 6 Million Records at Stake—Inside the UAE’s Cybersecurity Showdown

    Defense Contractor, U.S. Air Force, Morse Corp, Cybersecurity Compliance, NIST, Federal Cybersecurity Standards, Department of Justice, Settlement Agreement

    Defense Contractor Morse Corp Settles Cybersecurity Fraud Allegations for $4.6M

    Stable Channel Update

    Chrome Releases Critical Update to Address CVE-2025-2783 Vulnerability

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    UAE Cyberattack

    634 Targets, 6 Million Records at Stake—Inside the UAE’s Cybersecurity Showdown

    Defense Contractor, U.S. Air Force, Morse Corp, Cybersecurity Compliance, NIST, Federal Cybersecurity Standards, Department of Justice, Settlement Agreement

    Defense Contractor Morse Corp Settles Cybersecurity Fraud Allegations for $4.6M

    Hong Kong Cybersecurity Law

    Hong Kong Tightens Cyber Laws—What It Means for Businesses and Tech Investments

    DCCOM and SAFC4DC

    DCCOM and SAFC4DC: A Strategic Move to Secure Singapore’s Digital Backbone

    Google Chrome

    Remove These Extensions Now! Hackers Hijack Google Chrome Add-ons for Fraud

    Cybersecurity Leaders

    Meet the Top 100 Cybersecurity Leaders in Australia & New Zealand

    Human Body

    What Cybersecurity Can Teach Us About the Human Body

    Cybersecurity in 2025

    Cybersecurity in 2025: Shadow AI, Deepfakes, and the Next Wave of Threats

    AWS S3 buckets

    Why AWS S3 Buckets Are the New Target for Ransomware Campaigns

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

    Streaming Platforms

    Protect Your Streaming Accounts Now Before It’s Too Late

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Oracle, Oracle Singapore, Singapore, Oracle Singapore Partnership,

    Singapore Inks Deal with Oracle for “Isolated” Cloud Computing and AI Services

    Wiz acquisition

    Will Wiz Finally Sell? Alphabet Increases Offer to $30 Billion in Renewed Talks

    Globee Cybersecurity Awards 2025

    Cyble Secures Prestigious Recognition with Four Silver Wins at the Globee Cybersecurity Awards 2025

    E-Wallets

    7 Tools to Prevent Breaches in E-Wallets and Crypto Wallets

    Archana Venugopal

    Archana Venugopal Takes Charge as Senior VP & CISO at National Commodity Exchange

    Cyble

    Cyble Dominates G2 Winter 2025 Report as a Leader Across Various Verticals of Cybersecurity

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Cyble

    Cyble Strengthens Regional Cyber Resilience with Infratech Partnership at Black Hat MEA 2024

    Cyber warfare

    Can AI Save the UK from a Cyber Catastrophe? The Fight Against Russian Hackers

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Tor Browser

    Tor Browser 13.5.14 Update Fixes Critical Security Flaw for Windows 7, 8, and 8.1

    Firefox vulnerability

    Firefox Patch Released as Mozilla Addresses Chrome-Like Security Threat

    Known Exploited Vulnerabilities Catalog

    CISA Issues Urgent Security Alerts: Critical Vulnerabilities in Schneider Electric, Chrome, and Sitecore

    Serbian Journalists

    Investigative Journalists in Serbia Hit by Advanced Spyware Attack

    Ingress-NGINX Controller

    Multiple CVEs Found in Ingress-NGINX—Patch Now to Prevent Cluster Compromise

    CVE-2025-26512

    SnapCenter Security Flaw Rated Critical—NetApp Urges Immediate Patch

    UAE Cyberattack

    634 Targets, 6 Million Records at Stake—Inside the UAE’s Cybersecurity Showdown

    Defense Contractor, U.S. Air Force, Morse Corp, Cybersecurity Compliance, NIST, Federal Cybersecurity Standards, Department of Justice, Settlement Agreement

    Defense Contractor Morse Corp Settles Cybersecurity Fraud Allegations for $4.6M

    Stable Channel Update

    Chrome Releases Critical Update to Address CVE-2025-2783 Vulnerability

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    UAE Cyberattack

    634 Targets, 6 Million Records at Stake—Inside the UAE’s Cybersecurity Showdown

    Defense Contractor, U.S. Air Force, Morse Corp, Cybersecurity Compliance, NIST, Federal Cybersecurity Standards, Department of Justice, Settlement Agreement

    Defense Contractor Morse Corp Settles Cybersecurity Fraud Allegations for $4.6M

    Hong Kong Cybersecurity Law

    Hong Kong Tightens Cyber Laws—What It Means for Businesses and Tech Investments

    DCCOM and SAFC4DC

    DCCOM and SAFC4DC: A Strategic Move to Secure Singapore’s Digital Backbone

    Google Chrome

    Remove These Extensions Now! Hackers Hijack Google Chrome Add-ons for Fraud

    Cybersecurity Leaders

    Meet the Top 100 Cybersecurity Leaders in Australia & New Zealand

    Human Body

    What Cybersecurity Can Teach Us About the Human Body

    Cybersecurity in 2025

    Cybersecurity in 2025: Shadow AI, Deepfakes, and the Next Wave of Threats

    AWS S3 buckets

    Why AWS S3 Buckets Are the New Target for Ransomware Campaigns

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

    Streaming Platforms

    Protect Your Streaming Accounts Now Before It’s Too Late

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Oracle, Oracle Singapore, Singapore, Oracle Singapore Partnership,

    Singapore Inks Deal with Oracle for “Isolated” Cloud Computing and AI Services

    Wiz acquisition

    Will Wiz Finally Sell? Alphabet Increases Offer to $30 Billion in Renewed Talks

    Globee Cybersecurity Awards 2025

    Cyble Secures Prestigious Recognition with Four Silver Wins at the Globee Cybersecurity Awards 2025

    E-Wallets

    7 Tools to Prevent Breaches in E-Wallets and Crypto Wallets

    Archana Venugopal

    Archana Venugopal Takes Charge as Senior VP & CISO at National Commodity Exchange

    Cyble

    Cyble Dominates G2 Winter 2025 Report as a Leader Across Various Verticals of Cybersecurity

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Cyble

    Cyble Strengthens Regional Cyber Resilience with Infratech Partnership at Black Hat MEA 2024

    Cyber warfare

    Can AI Save the UK from a Cyber Catastrophe? The Fight Against Russian Hackers

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express by Cyble
No Result
View All Result

Decoding KillNet 2.0 and Sylhet Gang-SG Cyberattack Plans for 2024

The group explicitly shuns advertising, donations, or fees, highlighting its commitment to a decentralized approach.

by Ashish Khaitan
February 2, 2024
Reading Time: 3 mins read
KillNet 2.0
Share on LinkedInShare on Twitter

In a global hacking move, the Sylhet Gang-SG recently declared its allegiance to the notorious KillNet 2.0 hacker collective. This announcement ushers in a new era of cyber threats, particularly targeting allies of Israel.

KillNet 2.0, in a dark web statement, revealed its transformation into an international decentralized hacktivist group, emphasizing a diverse global membership with a focus on hardcore, targeted actions.

Describing itself as more than just a community but an idea fostering communities, KillNet 2.0 aims to unite hackers on the side of good from around the world.

The group explicitly shuns advertising, donations, or fees, highlighting its commitment to a decentralized approach to hacking activism.

The KillNet 2.0 Hacker Collective: The Threat of 2024

Following this development, Killmilk, a key player in the hacking world, introduced a new hacktivist group named Just Evil.

KillNet 2.0 Hacker Collective
Source: Daily Dark Web on X

This move effectively divides the original Killnet into three factions, including Deanon retaining control over the original Killnet channel, Killnet 2.0 will be welcoming new member groups, emphasizing an international and decentralized structure, and Just Evil, linked to Killmilk, expanding the influence of the original Killnet.

Your browser does not support the video tag.

The Cyber Express previously reported on the emergence of Killnet 2.0, a group challenging the conventional hierarchy of hacker communities.

Known for its proficiency in cyberattacks, the group has left its mark on the hacking industry with activities extending beyond mere notoriety.

Operating primarily on the dark web, KillNet 2.0’s illicit operations involve infiltrating systems and compromising sensitive information.

The Saga of KillNet Hacker Group

This pro-Russia hacker group gained infamy for its 2022 Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks during the Russian invasion of Ukraine.

Targeting global government institutions, the group’s activities prompted a warning from the Five Eyes intelligence alliance in April 2022.

As KillNet 2.0 solidifies its position, a previous instance in October 2023 indicates a surge in cyberattacks on Israeli government and media websites.

Various hacking groups, including those associated with Russia, have joined forces with the Palestinian military group Hamas.

Killnet, claiming to comprise patriotic Russian volunteer hackers, declared its intent to unleash distributed denial-of-service attacks on all Israeli government systems.

The group blames Israel for ongoing conflicts and accuses the country of supporting Ukraine and NATO.

Killnet proudly asserts its successful disruption of an Israeli government website and the security agency Shin Bet’s site, demonstrating its cyber capabilities.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Ashish Khaitan

Ashish Khaitan

Ashish is a technical writer at The Cyber Express. He adores writing about the latest technologies and covering the latest cybersecurity events. In his free time, he likes to play horror and open-world video games.

Next Post
CasaSpeciale data breach

CasaSpeciale Hit by Data Breach, AlphaTeam Claims Responsibility

Your browser does not support the video tag.


Follow Us On Google News

Latest Cyber News

Tor Browser
Firewall Daily

Tor Browser 13.5.14 Update Fixes Critical Security Flaw for Windows 7, 8, and 8.1

March 28, 2025
Firefox vulnerability
Cyber News

Firefox Patch Released as Mozilla Addresses Chrome-Like Security Threat

March 28, 2025
Known Exploited Vulnerabilities Catalog
Firewall Daily

CISA Issues Urgent Security Alerts: Critical Vulnerabilities in Schneider Electric, Chrome, and Sitecore

March 28, 2025
Serbian Journalists
Cyber News

Investigative Journalists in Serbia Hit by Advanced Spyware Attack

March 28, 2025

Categories

Select Category

    Web Stories

    Do This on Telegram, Your Bank Account Will Become Zero
    Do This on Telegram, Your Bank Account Will Become Zero
    If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
    If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
    Cricket World Cup Ticketing Systems Under Cybersecurity
    Cricket World Cup Ticketing Systems Under Cybersecurity
    Cyber Threats and Online Ticket Scams During the NBA Finals
    Cyber Threats and Online Ticket Scams During the NBA Finals
    Biometric Data Security: Protecting Sensitive Information
    Biometric Data Security: Protecting Sensitive Information
    Facebook Twitter LinkedIn

    About

    The Cyber Express

    #1 Trending Cybersecurity News and Magazine

    The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

     

    Contact

    For editorial queries: editor@thecyberexpress.com

    For marketing and Sales: raj@thecyberexpress.com

     

    Quick Links

    • About Us
    • Contact Us
    • Editorial Calendar
    • Careers
    • The Cyber Express by Cyble Vulnerability Disclosure Policy
    • Cyble Trust Portal

    Our Address

    We’re remote friendly, with office locations around the world:

    San Francisco, Atlanta, Rome,
    Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

     

    Headquarters:

    The Cyber Express LLC
    10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

     

    India Office:

    Cyber Express Media Network
    HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

    © 2022 - 2025 The Cyber Express by Cyble. All Rights Reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Magazine
    • Firewall Daily
    • Essentials
      • Regulations
      • Compliance
      • Governance
      • Policy Updates
    • Knowledge Hub
    • Features
      • Cyber Warfare
      • Espionage
      • Workforce
        • Learning & Development
    • Business
      • Startups
      • Mergers & Aquisitions
      • Partnerships
      • Appointments
      • Budgets
      • Research
        • Whitepapers
        • Sponsored Content
        • Market Reports
      • Interviews
        • Podcast
    • Events
      • Conference
      • Webinar
      • Endorsed Events
    • Advisory Board

    © 2022 - 2025 The Cyber Express by Cyble. All Rights Reserved

    Are you sure want to unlock this post?
    Unlock left : 0
    Are you sure want to cancel subscription?
    -
    00:00
    00:00

    Queue

        Update Required Flash plugin
        -
        00:00
        00:00
          Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information