Cool Audit

Beware of Weaponized Notezilla, RecentX, & Copywhiz Windows Tools that Deliver Stealing Malware

Kiosk Mode Bypass Flaw On Hotel Check-in Terminal Leaks Guests Personal Data

Hackers Employ JavaScript Framework To Trick Users Copy, Paste And Command Execution

VLC Media Player Vulnerabilities Allow Remote Code Execution

Fortinet to Acquire AI-Powered Cloud Security Platform Lacework

Safari, Microsoft Edge, & DuckDuckGo Spoofing Flaws Impacting Millions of Users

Chrome Introduced Shared Memory Versioning to Enhance Browser Performance

Threat Actor Claiming of Israel’s Government API Database

Total Fitness Exposes 500k Images of Members & Staff

Microsoft Unveils Ways To Detect Compromised Devices In Your Organization

Hackers Using Weaponized Word Documents In QR Code Phishing Attacks

WordPress Releases Urgent Security Update to Patch XSS and Path Traversal Flaws

HC3 Unveils Qilin Ransomware Attacking Global Healthcare Organizations

CISA’s CSAT Tool Hacked, Systems Taken Offline

ESET Security Products for Windows Vulnerable to Privilege Escalation

Life360 Breach: Hackers Accessed the Tile Customer Support Platform

Hackers Can Crack Down 59% Of Passwords Within A Hour

New Security Vulnerability Let Attackers Microsoft Corporate Email Accounts

CISA Reveals Guidance For Implementation of Encrypted DNS Protocols

Earth Hundun Hacker Group Employs Advanced Tactics to Evade Detection

WaveStealer Malware Delivered Via Telegram & Discord Messaging Platforms

Royal Tiger Group With Spoofed Phone Numbers Stealing Credit Card Data: FCC

Google Cloud Accidentally Deletes $125 Billion Pension Fund’s Online Account

Alert! Google Chrome Zero-day Exploited in the Wild

FBI Warns of Phishing Attack Targeting Retail Corporate Offices

City of Wichita Ransomware Attack: Services Impacted

Hackers Actively Exploiting Checkpoint 0-Day Flaw

Microsoft Observed Huge-Surge In Attacks Targeting Internet-Exposed OT Devices In WWS

Indian Stock Exchange BSE Starts Encrypting Messages to Traders

CasperSecurity Stealer Attacking Windows Machine to Steal RDP Credentials

Hackers Exploited GitHub and FileZilla to Deliver Banking Malware

SandStorm Hackers Added New Kapeka Tool to it’s Arsenal

Russian Hackers Charged For Selling Unauthorized Access To Computer Networks

Notorious Data Leak Site Breachforums is back From the Seizure

Hackers Advertising Pulse Connect Secure VPN RCE 0-Day

Ransomware Attacks Targeting VMware ESXi Infrastructure Adopt New Pattern

Threat Actor Claiming Access to AWS, Azure, MongoDB & Github API Keys

Rockwell Automation Warns Admin to Disconnect Devices From Internet

The Rise of Cybersecurity Freelancing: Harnessing Talent in a Digitally Transformed World 

Zero-Day Vulnerabilities: The Stealthy Threats Lurking in Cyberspace 

The Potential Dangers of Weak Bluetooth Devices: Protecting Your Digital Security 

Strengthening Cybersecurity:  

Common Vulnerabilities and Exposures (CVE): Enhancing Security through Standardized Identification 

Understanding the Implications of Stack-Based Buffer Overflow in Cybersecurity 

The Vulnerability Exposed: Buffer Overflow in Common Desktop Environment (CDE) 

Unveiling an Unspecified Vulnerability in Oracle OpenSolaris 

Presentation

Life is Good

Embracing the Future: Working from Home as a Cybersecurity Expert 

Online Learning Glossary

AI Powered Deepfake Detector to Combact Deepfakes Threats

Operation PANDORA Shutdown 12 Fake Call Centers that Steal Over €10M

Beware! Threat Actors Selling RDO Access on Hacker Forums

Millions of Docker Hub Repositories Found Pushing Malware for Over 5 Years

Introduction to Cybersecurity – Awareness on safeguarding your information in the Digital Era 

Ex-Infosec Designer Sentenced to Over 21 Years in Prison

ICICI Bank Data Leak Exposes 17,000 Customers’ Credit Card Data

Chrome Critical Flaw Let Attackers Execute Arbitary Code : Patch Now

Google Meet Now Allows Non-Google Account Users to Join Encrypted Calls

New Wavestealer Spotted in Wild Stealing Login Credentials & Credit Card Data