Cybersecurity firm Rapid7 has identified that popular Windows tools Notezilla, RecentX, and Copywhiz have been weaponized to deliver malware. These tools, developed by Conceptworld, an India-based company, are widely used for productivity enhancements. However, the installation packages available on the…
WordPress has released an urgent security update, version 6.5.5, addressing critical vulnerabilities that could potentially compromise the security of millions of websites. This minor release, which also includes three bug fixes in the core, is highly recommended for immediate installation to ensure…
The Health Sector Cybersecurity Coordination Center (HC3) has issued a critical alert regarding a new ransomware strain, Qilin, which is targeting healthcare organizations worldwide. This revelation underscores the escalating cyber threats facing the healthcare sector, which is already grappling with the complexities…
The Cybersecurity and Infrastructure Security Agency’s (CISA) Chemical Security Assessment Tool (CSAT) was the target of a cybersecurity intrusion by a malicious actor from January 23-26-2024. The breach, which has raised significant concerns within the cybersecurity community, potentially exposed sensitive information including…
ESET, a leading cybersecurity company, recently addressed a local privilege escalation vulnerability in its Windows security products. The Zero Day Initiative (ZDI) reported the vulnerability to ESET. It could have allowed attackers to misuse ESET’s file operations during a restore operation from…
Life360, a company known for its family safety services, recently fell victim to a criminal extortion attempt. The company received emails from an unknown actor claiming to possess Tile customer information. Upon receiving these emails, Life360 promptly investigated and detected unauthorized access…
Researchers analyzed real-world passwords leaked on the dark web instead of artificial ones used in labs, as their findings showed that a worrying 59% of these passwords could be cracked within an hour using just a modern graphics card and…
A newly discovered security vulnerability allows attackers to impersonate Microsoft corporate email accounts, significantly increasing the risk of phishing attacks. Security researcher Vsevolod Kokorin, also known as Slonser, found this bug, which Microsoft has not yet patched. Kokorin revealed the…
Hackers often abuse weaponized Word docs, as they can contain macros that contain or exploit flaws inside those Word files to run destructive code upon being opened by the intended victims. It enables an attacker to employ this tool to…
Microsoft has announced a new way to spot potentially hacked machines in your organization. Analysts may now easily identify, examine, and search for suspicious interactive processes running on “hidden desktops” using Defender for Endpoint’s “DesktopName” field. These days, remote desktop protocol…
Cybersecurity researcher Jeremiah Fowler discovered a non-password-protected database containing 474,651 images belonging to Total Fitness, a health club chain with 15 locations across North England and Wales. The database, which was 47.7 GB in size, included personal screenshots, profile pictures of members…
A threat actor has claimed responsibility for breaching Israel’s government API database. The announcement was made via a post on social media X by the darkwebinformer. Details of the Breach According to the post, the threat actor claims to have…
VideoLAN, the organization behind the popular VLC Media Player, has disclosed multiple critical vulnerabilities that could allow attackers to execute arbitrary code remotely. These vulnerabilities affect both the desktop and iOS versions of the software. The security advisories, identified as SB-VLC3021 and SB-VLC-iOS359,…
Fortinet, a global leader in broad, integrated, and automated cybersecurity solutions, has announced its acquisition of Lacework, an AI-powered cloud-native application protection platform (CNAPP). This strategic move aims to enhance Fortinet’s already comprehensive cybersecurity platform by integrating Lacework’s advanced cloud…
RedSecLabs security researchers Rafay Baloch and Muhammad Samaak have uncovered address bar spoofing vulnerabilities in widely used mobile browsers such as Safari, Microsoft Edge, and DuckDuckGo. These vulnerabilities have a significant impact, affecting millions of users worldwide. The Severity of Address Bar…
Google Chrome recently implemented Shared Memory Versioning, improving its speed through more effective cookie handling. This upgrade improves Chrome and other Chromium-powered browsers like Microsoft Edge and Vivaldi. Resource contention arises as more people rely on the Internet to do their daily…
A new vulnerability has been discovered in Ariane Allegro Scenario Player in a Kiosk mode that could allow threat actors to bypass the Kiosk mode and access the underlying Windows Desktop. The CVE for this vulnerability is yet to be…
Hackers use JavaScript frameworks since they offer a wide range of functionalities and tools that could be used to bypass detection, hide code, and carry out harmful acts. In addition, they take advantage of the people’s trust in such popular…
Cybersecurity experts have identified a critical zero-day vulnerability in Checkpoint’s security software that hackers are actively exploiting. The flaw assigned to the identifier CVE-2024-24919 poses a significant threat to organizations relying on Checkpoint’s solutions for their cybersecurity needs. Details of…
Microsoft has reported a significant increase in cyberattacks targeting internet-exposed, poorly secured operational technology (OT) devices. These attacks have particularly focused on the United States’ water and wastewater systems (WWS). Various nation-backed actors, including the IRGC-affiliated “CyberAv3ngers” and pro-Russian hacktivists,…
The Bombay Stock Exchange (BSE) has begun encrypting messages sent to traders, becoming the first exchange in the world to implement such a system. The move aims to enhance security and protect sensitive information in the face of growing cyber…
A Russian citizen has been indicted for working as an “access broker” and selling unauthorized access to computer networks, including a victim company in New Jersey, U.S. Attorney Philip R. Sellinger, District of New Jersey, announced. Details of the Indictment Evgeniy…
The notorious data breach forum, Breachforums, has re-emerged after being confiscated by authorities in a surprising development. According to the recent tweet from Dark Web Informer, the news has sent shockwaves through the cybersecurity community and raised concerns about the…
Cybersecurity experts have identified a critical zero-day vulnerability in Pulse Connect Secure VPN, a widely used virtual private network solution. The vulnerability, which allows for remote code execution (RCE), has been actively exploited by hackers, raising significant concerns among organizations relying on…
Cybersecurity professionals at Sygnia have noted a notable change in the strategies used by ransomware groups that are aiming at virtualized environments, specifically VMware ESXi infrastructure, in relation to development. The incident response team has noted a steady increase in…
A threat actor has claimed to have gained unauthorized access to API keys for major cloud service providers, including Amazon Web Services (AWS), Microsoft Azure, MongoDB, and GitHub. The announcement was made via a post on the social media platform X by…
Rockwell Automation has sent an urgent message to all of its customers because of rising geopolitical issues and hostile cyber activity worldwide. The company is asking that any devices currently connected to the public internet be checked out immediately and shut…
A new piece of malware called CasperSecurity Stealer is a major threat to Windows computers. This complex malware is made to steal Remote Desktop Protocol (RDP) credentials, which is very dangerous for individuals and businesses. A New Breed of Malware CasperSecurity…
The Insikt Group at Recorded Future has found a sophisticated cybercrime operation run by Russian-speaking threat actors from the Commonwealth of Independent States (CIS). This group of hackers has used safe websites like GitHub and FileZilla to spread banking malware, which…
“Encrypted DNS Implementation Guidance,” a detailed document from the Cybersecurity and Infrastructure Security Agency (CISA), tells government agencies how to improve their cybersecurity by using encrypted Domain Name System (DNS) protocols. This advice is in line with Memorandum M-22-09 from…
Earth Hundun, a notable Asia-Pacific malware organization, uses Waterbear and Deuterbear. We first encountered Deuterbear in Earth Hundun’s arsenal in October 2022, signaling its implementation. This report describes the ultimate Remote Access Trojan (RAT) we recovered from a C&C server from an…
Cybersecurity experts have identified a new malware, dubbed WaveStealer, that is being actively distributed through popular messaging platforms Telegram and Discord. This sophisticated malware masquerading as video game installers poses a significant threat to users by targeting their sensitive data. How…
According to the Federal Communications Commission (FCC), the Royal Tiger Group and its employees are a Consumer Communications Information Services Threat (C-CIST). This is a crucial step for the FCC in its ongoing work to protect U.S. customers from sophisticated…
A major mistake in setup caused Google Cloud and UniSuper to delete the financial service provider’s private cloud account. This event has caused a lot of worry about the security and dependability of cloud services, especially for big financial companies. The outage…
Google has released an urgent update for its popular Chrome web browser. The update fixes a critical zero-day vulnerability that malicious attackers are actively exploiting. The vulnerability is considered to be high-risk, and if left unpatched, attackers can gain unauthorized…
The Federal Bureau of Investigation (FBI) has warned about a sophisticated phishing and smishing (SMS phishing) campaign orchestrated by a cybercriminal group known as STORM-0539, or Atlas Lion. This group has been actively targeting the gift card departments of major…
The City of Wichita, Kansas, experienced a disruption when it fell victim to a ransomware attack. This cyber assault encrypted data across various city systems, prompting officials to shut down the affected networks as a containment measure. The attack has impacted several…
Kapeka, also known as KnuckleTouch, is a sophisticated backdoor malware that has been making waves in the cybersecurity world. Initially appearing in mid-2022, it wasn’t until 2024 that Kapeka was formally tracked due to its involvement in limited-scope attacks, particularly in Eastern…
McAfee has introduced a significant upgrade to its AI-powered deepfake detection technology. This enhancement, developed in collaboration with Intel, aims to provide a robust defense against the escalating threat of deepfake scams and misinformation. The McAfee Deepfake Detector utilizes the advanced capabilities…
Operation PANDORA has successfully dismantled a network of 12 fraudulent call centers, dealing a significant blow to a sophisticated criminal enterprise that has stolen over €10 million from unsuspecting victims. This landmark operation, spearheaded by Europol, marks a critical step forward…
Cybersecurity communities are on high alert as threat actors have begun selling Remote Desktop Protocol (RDO) access on underground hacker forums. This alarming trend poses significant risks to individual and organizational cybersecurity, potentially allowing unauthorized access to sensitive information and critical systems.…
It has been found that almost one-fifth of the repositories on Docker Hub, a popular platform for developers to store and share containerized applications, have been exploited to spread malicious software and phishing scams. This is a concerning discovery for…
Jareh Sebastian Dalke, 32, of Colorado Springs, was sentenced today to 262 months in prison for attempted espionage in connection with his efforts to transmit classified National Defense Information (NDI) to an agent of the Russian Federation. According to the US…
ICICI Bank, one of India’s leading private banks, has confirmed the exposure of sensitive credit card information belonging to thousands of customers. The Mumbai-based bank acknowledged that a technical glitch in its mobile banking application, iMobile Pay, led to approximately…
Google announced the release of Chrome 124, which fixes four vulnerabilities, including a critical security issue that allows attackers to execute arbitrary code. Over the next few days or weeks, the Google Stable channel will be updated to 124.0.6367.78/.79 for Windows…
Google has announced that external participants without Google accounts can join client-side encrypted Google Meet calls. This move marks a substantial step in balancing user accessibility with robust security measures. Google Meet has become an essential tool for virtual meetings, especially with…
A new type of malware dubbed “Wavestealer” has been identified. This malicious software reportedly steals sensitive information such as login credentials and credit card data from unsuspecting users. Wavestealer is designed to infiltrate computer systems silently and remains undetected by…
A vulnerability was identified in the WordPress theme, “Responsive,” allowing attackers to inject arbitrary HTML content into websites. This flaw, as CVE-2024-2848, poses a severe risk to website integrity and user safety. CVE-2024-2848 – Arbitrary HTML Content Injection The vulnerability was specifically found…
The FBI’s Internet Crime Complaint Center (IC3) has warned about a sophisticated smishing scam targeting drivers across multiple states. Since early March 2024, over 2,000 complaints have been filed with the IC3, detailing fraudulent text messages that masquerade as road…
Many generations might have passed on and many generations may come in future. But one thing that will remain common across an individual or group is the thought of gaining supremacy over the wealth of another and trying to rule…
Introduction The global pandemic caused an unprecedented change in how we work, resulting in the development of the work-from-home (WFH) culture. While many industries experienced difficulties as a result of this change, cybersecurity saw a rare chance to fortify its…
Introduction The demand for cybersecurity skills is on the rise in today’s hyper-connected and digitized world, where cyber dangers are constantly evolving. The demand for qualified individuals in the cybersecurity industry has never been higher as organizations struggle to protect…
Introduction The phrase “zero-day vulnerability” sends chills down the spines of security professionals and everyday people alike in the constantly changing world of cybersecurity. One of the most serious and elusive types of cyber threats is zero-day vulnerabilities, which can…
Introduction: The way we communicate and engage with numerous devices has been revolutionized by Bluetooth technology. Bluetooth is now found in every aspect of our everyday lives, from smart home appliances and fitness trackers to wireless headphones and speakers. But…
The Importance of Supply Chain Risk Management Introduction: Organizations are accountable for protecting their supply chains from cyber-attacks in addition to defending their internal networks in an increasingly connected digital environment. Supply chain risk management has become a crucial component…
Introduction: Security flaws and exposes put computer systems and software programs at serious risk in today’s fast-paced technological world. The Common Vulnerabilities and Exposures (CVE) system was developed to address this recurrent issue. An organized method for locating, naming, and…
Introduction: Understanding the numerous flaws that could compromise the security of computer systems is essential in the field of cybersecurity. The stack-based buffer overflow is one such flaw that still poses a serious hazard. The technical components of this vulnerability,…
Introduction: It is crucial in the field of cybersecurity to quickly identify and fix flaws that could be used by malevolent parties to their advantage. The Common Desktop Environment (CDE)’s buffer overflow vulnerability is one of the flaws that has…
Introduction: Security is crucial in the domain of operating systems for protecting sensitive data and guaranteeing the general integrity of the system. But occasionally, flaws appear that might leave crucial systems open to attack and exploitation. This article explores an…