Author: Cybernoz

HPE Aruba Network Vulnerabilities Let Attackers Execute Arbitrary Code Remotely
20
Jan
2025

HPE Aruba Network Vulnerabilities Let Attackers Execute Arbitrary Code Remotely

Multiple critical vulnerabilities have been discovered in HPE Aruba Network, affecting its AOS Controllers, Gateways, and Mobility Conductor products.  Specifically,…

ChatGPT Crawler Vulnerability Abused to Trigger Reflexive DDoS Attacks
20
Jan
2025

ChatGPT Crawler Vulnerability Abused to Trigger Reflexive DDoS Attacks

Security researchers have uncovered a severe vulnerability in OpenAI’s ChatGPT API, allowing attackers to exploit its architecture for launching Reflective…

Telegram-Based "Sneaky 2FA" Phishing Kit Targets Microsoft 365 Accounts
20
Jan
2025

Telegram-Based “Sneaky 2FA” Phishing Kit Targets Microsoft 365 Accounts

Sneaky 2FA: New Phishing-as-a-Service targets Microsoft 365, leveraging sophisticated evasion techniques and a Telegram-based platform to steal credentials. In December…

Outlook
20
Jan
2025

Microsoft shares temp fix for Outlook crashing when writing emails

Microsoft has shared a temporary fix for a known issue that causes classic Outlook to crash when writing, replying to,…

New IoT Botnet Launching Large-Scale DDoS Attacks Hijacking IoT Devices
20
Jan
2025

New IoT Botnet Launching Large-Scale DDoS Attacks Hijacking IoT Devices

A newly identified Internet of Things (IoT) botnet has been orchestrating large-scale Distributed Denial-of-Service (DDoS) attacks globally since late 2024,…

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims in December
20
Jan
2025

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how threat actor strategies are constantly evolving….

Yubico 2FA Bypass Vulnerability Advisory For Linux & MacOS
20
Jan
2025

Yubico 2FA Bypass Vulnerability Advisory For Linux & MacOS

Yubico has released a security advisory, YSA-2025-01, which highlighted a vulnerability within the software module that supports two-factor authentication (2FA)…

Hackers Allegedly Claiming Breach Of Hewlett Packard Enterprise
20
Jan
2025

Hackers Allegedly Claiming Breach Of Hewlett Packard Enterprise

Threat actor IntelBroker allegedly breached Hewlett Packard Enterprise (HPE) and claimed responsibility for the intrusion on a dark web forum….

Apple Confirms Removal of TikTok App US Users
20
Jan
2025

Apple Confirms Removal of TikTok App US Users

Apple has confirmed that popular apps developed by ByteDance Ltd., including TikTok, will no longer be available for download or…

Beware Of Your LinkedIn Contacts, They May Targeting Your Organization Assets
20
Jan
2025

Beware Of Your LinkedIn Contacts, They May Targeting Your Organization Assets

A significant cybersecurity threat involving North Korean hackers exploiting LinkedIn as an entry point to infiltrate organizations.  This attack has…

Sophisticated Linux Rootkit That Persist Even After Reboots
20
Jan
2025

Sophisticated Linux Rootkit That Persist Even After Reboots

Pumakit is a sophisticated rootkit that leverages system call interception to manipulate file and network activity. It ensures persistence through…

New Android Malware Mimics Chat App to Steal Sensitive Data
20
Jan
2025

New Android Malware Mimics Chat App to Steal Sensitive Data

A sophisticated Android malware campaign targeting users in South Asia, particularly in the Kashmir region of India has been recently…