Category: CyberSecurityNews

Chrome Security Update: Patch for Type Confusion Vulnerabilities
09
Oct
2024

Patch for Type Confusion Vulnerabilities

Google has released a critical security update for its Chrome browser, addressing several vulnerabilities, including two high-severity type confusion flaws…

Microsoft Security Updates: 5 Zero-Days & 118 Vulnerabilities Patched
09
Oct
2024

Microsoft Security Updates: 5 Zero-Days & 118 Vulnerabilities Patched

In its latest Patch Tuesday release, Microsoft addressed 118 vulnerabilities, including five zero-day flaws, two of which attackers are actively exploiting….

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management
08
Oct
2024

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management

Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined user experience. Badge Inc., the award-winning…

What is Bastion Host? Types, Architecture & Use Cases
08
Oct
2024

What is Bastion Host? Types, Architecture & Use Cases

A bastion host is a critical line of defense, acting as a fortified gateway between an internal network and external…

Vulnerability Scanner Released For CUPS Printing System Flaws
08
Oct
2024

Vulnerability Scanner Released For CUPS Printing System Flaws

A critical set of vulnerabilities in the Common Unix Printing System (CUPS) has been disclosed, allowing remote attackers to execute…

Ukrainian Hackers Attack Russian Media Following Putin’s Birthday
08
Oct
2024

Ukrainian Hackers Attack Russian Media Following Putin’s Birthday

Ukrainian hackers launched a large-scale attack on Russian state media company VGTRK on October 7, coinciding with President Vladimir Putin’s…

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windows Servers
08
Oct
2024

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windows Servers

LemonDuck malware has evolved from a cryptocurrency mining botnet into a “versatile malware” that is capable of “stealing credentials,” “disabling…

North Korean APT Hackers Exploiting DMARC Misconfigs For Phishing Attacks
08
Oct
2024

North Korean APT Hackers Exploiting DMARC Misconfigs For Phishing Attacks

DMARC is an email authentication protocol that helps domain owners protect against unauthorized use like “email spoofing” and “phishing attacks.”…

Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls
08
Oct
2024

Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls

DNS tunneling is a hacking technique that hides information by taking advantage of the DNS protocol. This attack enables threat…

Your Smart TVs Tracking Your Viewing Habits Using ACR technology
08
Oct
2024

Your Smart TVs Tracking Your Viewing Habits Using ACR technology

A recent study has shed light on the extensive use of Automatic Content Recognition (ACR) technology by smart TVs to…

iTunes 0-day Privilege Escalation Flaw Let Attackers Hack Windows
08
Oct
2024

iTunes 0-day Privilege Escalation Flaw Let Attackers Hack Windows

iTunes is a media player which is developed by Apple Inc. and this application enables users to purchase, organize, and…

Casio Suffers Major Cyber Attack
08
Oct
2024

Unauthorized Access to Network Confirmed

Casio Computer Co., Ltd., a renowned Japanese electronics manufacturer, has confirmed a significant cybersecurity breach that occurred on October 5,…