InfoSec Defence
Cyber Attack
Malware Attack
Vulnerabilities
Ransomware
Reports
New In Technology
Patches
Cyber Attack
Malware Attack
Vulnerabilities
Ransomware
Reports
New In Technology
Patches
Vulnerabilities
New Tool "BlueDucky" Exploits Bluetooth Vulnerability for 0-Click Code Execution
By
|
Admin
|
2024-03-28
Cyber Attack
Hackers Exploit Vulnerability in Ray Framework to Breach Servers and Hijack Resources
Malware Attack
The Moon Malware Infects 6,000 ASUS Routers Within 72 Hours to Serve as Proxies
Vulnerabilities
Input Validation Flaw in MobSF Pen-Testing Tool Leads to SSRF Vulnerability
Cyber Attack
Hackers Allegedly Gain Unauthorized Entry to Fortinet Devices Across Multiple Companies
Cyber Attack
Developers on GitHub Targeted in Sophisticated Supply Chain Cyberattack
Cyber Attack
Raspberry Pi Transformed by Hackers into an Online Anonymity Tool
Reports
New Phishing Attacks Unleash StrelaStealer on Over 100 EU and US Organizations
Malware Attack
AndroxGh0st Malware Targets Laravel Applications to Extract Cloud Credentials
Vulnerabilities
UAE Cybersecurity Council Warns of High-Risk Vulnerabilities in Google Chrome
Cyber Attack
Belgian Grand Prix Email Account Compromised for Phishing Scam
Cyber Attack
Critical Denial-of-Service Attacks Target UDP-Based Network Communications
Reports
Report: Hundreds of Government Units and Companies in China Compromised by Cyberattacks
Vulnerabilities
'GoFetch' Vulnerability Exposes Apple Silicon's Encryption Weakness
Cyber Attack
New Phishing Campaign Targets US Organizations with NetSupport RAT
Vulnerabilities
New Technique Puts Millions of Windows Domains at Risk, Warns Akamai Researchers
Malware Attack
Malicious Sign1 Malware Campaign Hits 39,000 WordPress Websites
Reports
Russian State Hackers Launch Targeted Phishing Campaigns in Global Espionage Efforts
New In Technology
Pwn2Own Vancouver 2024 Wraps Up with Hackers Earning Over $1.1 Million and Exploiting 29 Zero-Day Vulnerabilities
Malware Attack
Corporate Phishing Campaign Utilizing 'Fluffy Wolf' Disseminates Meta Stealer
Cyber Attack
EPA and White House Issue Warning: US Water Systems Under Cyberattack Threat
Vulnerabilities
Oracle cautions that macOS 14.4 update disrupts Java functionality on Apple CPUs
Cyber Attack
Security Oversight Exposes 19 Million Passwords in Firebase Instances, Unencrypted
Cyber Attack
New Cyberattack Method "Conversation Overflow" Targets Executives by Evading AI Security
Malware Attack
Malware Threatens Over 100,000 Projects on GitHub
Cyber Attack
Hackers Allegedly Leak Over 70 Million Records Purportedly Obtained from AT&T
Cyber Attack
Fujitsu Discovers Malware Infection, Confirms Customer Data Breach
Vulnerabilities
Novel Proof-of-Concept Attack Reveals ChatGPT Vulnerabilities
Cyber Attack
Hackers leverage Aiohttp vulnerability to target susceptible networks
Cyber Attack
IMF Discloses Cyber Incident: 11 Email Accounts Compromised
Cyber Attack
Financial Services Firm WeRize Falls Victim to Data Breach
Cyber Attack
Hackers Employ Weaponized PDFs to Distribute Remcos RAT
Vulnerabilities
Vulnerabilities in ChatGPT Plug-in Pose Risk of Exposing Sensitive Data
Cyber Attack
Data Breach at French Unemployment Agency Affects 43 Million Individuals
Reports
Report: Exploitation of eSIM Vulnerabilities by SIM Swappers for Phone Numbers
Patches
Chipmakers Intel and AMD Release Patches to Address New Microarchitectural Vulnerabilities
Ransomware
StopCrypt Ransomware Evades Detection, Becomes Widely Distributed
Vulnerabilities
CERT-In Issues Alert Regarding Numerous Security Vulnerabilities Impacting Latest Android Versions
Cyber Attack
Russian-Backed Hacktivists Launch DDoS Cyberattack on Alabama
Malware Attack
New PixPirate Banking Trojan for Android Uses Innovative Technique to Stay Hidden on Phones
Patches
Cisco Addresses Critical Vulnerabilities in IOS RX
Vulnerabilities
Researchers Outline Kubernetes Vulnerability Allowing Windows Node Takeover
Cyber Attack
French Government Reports Unprecedented Surge in Cyberattacks
Cyber Attack
Advanced Vishing Campaigns Sweep Across the Globe
Vulnerabilities
Study Reveals Cybersecurity Risks from Misconfigured Microsoft SCCM Systems
Patches
Microsoft Patch Actively Exploited Admin-to-Kernel Vulnerability
Cyber Attack
15,000 Compromised Roku Accounts Sold online
Vulnerabilities
Proof-of-Concept Exploit Released for Critical Progress Software OpenEdge Vulnerability
Cyber Attack
Hackers Exploit Vulnerability in Popup Builder Plugin, Infecting 3,300 WordPress Sites with Malware
Malware Attack
WogRAT Malware Targets Windows and Linux Systems Through Exploited Notepad Service
Cyber Attack
Magnet Goblin Exploits 1-Day Vulnerabilities for Financial Gain
Cyber Attack
CISA Discloses Breach, Shuts Down Systems Amidst Cybersecurity Concerns
Vulnerabilities
Critical SSL VPN Flaw in FortiOS Warned by Fortinet, Potentially Exploited in Active Attacks
Cyber Attack
Critical Flaw in JetBrains TeamCity Exploited; 1.4k Servers Compromised
Patches
AnyCubic Resolves 3D Printer Zero-Day Vulnerability with Firmware Update
Cyber Attack
Cyber Attack Impacts Duvel Beer Production
Patches
Cisco Releases Patch for Critical VPN Hijacking Vulnerability in Secure Client
Cyber Attack
WordPress Sites Exploited: Visitors' Browsers Used for Distributed Brute-Force Attacks
Cyber Attack
Bifrost Trojan's Linux Variants Employ Typosquatting to Evade Detection
Vulnerabilities
Critical Authentication Bypass Flaw in QNAP NAS Devices Prompts Warning
Malware Attack
Python-Based Snake Info Stealer Spreads via Facebook Messages
Malware Attack
Golang Malware Targets Docker, Hadoop, Redis, and Confluence Systems, Warns Security Experts
Cyber Attack
Hackers Exploit QEMU for Covert Network Traffic Tunneling in Cyberattacks
Cyber Attack
Online Leak Exposes Millions of Google, WhatsApp, and Facebook 2FA Security Codes
Ransomware
Hamilton City Hit by Ransomware Attack, Services Paralyzed for First Time
Patches
Hikvision Addresses High-Severity Vulnerability in Security Management System with Patch
Ransomware
BlackCat Ransomware Shuts Down Servers Amid Allegations of $22 Million Ransom Theft
Cyber Attack
Hackers of TA577 Group Shift Tactics, Utilizing Phishing to Snatch NTLM Authentication Hashes
Ransomware
U.S. Agencies Warn of Phobos Ransomware Targeting Critical Infrastructure
Vulnerabilities
CISA Issues Warning: Malware Exploits Microsoft Streaming Bug
Cyber Attack
Malicious AI Models on Hugging Face Threaten Users' Machines
Malware Attack
GTPDOOR Malware: A Threat Targeting Telecoms, Exploiting GPRS Roaming Networks
Vulnerabilities
VoltSchemer's Exploit Enables Wireless Charger Takeovers
Cyber Attack
Major Brands' Subdomains Hijacked in Extensive Spam Campaign
Malware Attack
Pikabot Unveils Latest Tricks: A Return with Surprising Innovations
Vulnerabilities
US and Allied Nations Issue Warning: Russian Hackers Transitioning to Cloud Attacks
New In Technology
Breaking Ground: US-India Cybersecurity Initiative Launched to Fortify IT Connections
Ransomware
Blackcat Ransomware Attack on UnitedHealth Unit Causes US Pharmacy Outage, Sources Report
Cyber Attack
Hackers Exploit 14-Year-Old CMS Editor on Government and Education Websites for SEO Poisoning
Cyber Attack
RCMP Confirms Cyber Attack, Assures No Impact on Operations
New In Technology
CISA, EPA, and FBI Unite to Strengthen Cybersecurity for Water Systems
Malware Attack
Rhadamanthys Stealer: A New Cyber Threat to the Oil and Gas Industry
Vulnerabilities
Exploitation of New ScreenConnect RCE Flaw in Ransomware Attacks
Reports
Stolen Credentials Identified as Primary Risk in X-Force Threat Intelligence Index 2024
Cyber Attack
Francis Howell Schools, Missouri, Offline Following Cyber Attack
Cyber Attack
Hackers Strike Malawi, Prompting Suspension of Passport Issuance
Cyber Attack
Change Healthcare Confirms Cyber Attack, Disrupting Systems Across US Healthcare
Reports
New Cybersecurity Report from CrowdStrike Shows Cloud Attacks Surge by 75%
Ransomware
PSI, Control Systems Firm, Faces Uphill Battle in Ransomware Attack Recovery
Vulnerabilities
VMware Urges Admins: Remove Deprecated, Vulnerable Authentication Plug-In
Ransomware
Cactus Ransomware Group Claims 1.5TB Data Theft from Schneider Electric
Malware Attack
RatMilad can secretly record your phone calls
Trending News
Vulnerabilities
New Tool "BlueDucky" Exploits Bluetooth Vulnerability for 0-Click Code Execution
Cyber Attack
Hackers Exploit Vulnerability in Ray Framework to Breach Servers and Hijack Resources
Malware Attack
The Moon Malware Infects 6,000 ASUS Routers Within 72 Hours to Serve as Proxies
Vulnerabilities
Input Validation Flaw in MobSF Pen-Testing Tool Leads to SSRF Vulnerability
Cyber Attack
Hackers Exploit Vulnerability in Ray Framework to Breach Servers and Hijack Resources
Hackers Allegedly Gain Unauthorized Entry to Fortinet Devices Across Multiple Companies
Developers on GitHub Targeted in Sophisticated Supply Chain Cyberattack
Reports
New Phishing Attacks Unleash StrelaStealer on Over 100 EU and US Organizations
Report: Hundreds of Government Units and Companies in China Compromised by Cyberattacks
Russian State Hackers Launch Targeted Phishing Campaigns in Global Espionage Efforts
Categories
Cyber Attack
Malware Attack
Vulnerabilities
Ransomware
Reports
New In Technology
Patches
Popular Posts
Vulnerabilities
New Tool "BlueDucky" Exploits Bluetooth Vulnerability for 0-Click Code Execution
Cyber Attack
Hackers Exploit Vulnerability in Ray Framework to Breach Servers and Hijack Resources
Malware Attack
The Moon Malware Infects 6,000 ASUS Routers Within 72 Hours to Serve as Proxies
Vulnerabilities
Input Validation Flaw in MobSF Pen-Testing Tool Leads to SSRF Vulnerability
Cyber Attack
Hackers Allegedly Gain Unauthorized Entry to Fortinet Devices Across Multiple Companies
Cyber Attack
Developers on GitHub Targeted in Sophisticated Supply Chain Cyberattack
Cyber Attack
Raspberry Pi Transformed by Hackers into an Online Anonymity Tool
Reports
New Phishing Attacks Unleash StrelaStealer on Over 100 EU and US Organizations
New In Technology
Pwn2Own Vancouver 2024 Wraps Up with Hackers Earning Over $1.1 Million and Exploiting 29 Zero-Day Vulnerabilities
Breaking Ground: US-India Cybersecurity Initiative Launched to Fortify IT Connections
CISA, EPA, and FBI Unite to Strengthen Cybersecurity for Water Systems