Category: CyberSecurityNews

IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration
17
Feb
2025

IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration

A critical Insecure Direct Object Reference (IDOR) vulnerability was recently discovered in ExHub, a cloud-based platform for hulia-based development.  This…

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication
17
Feb
2025

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication

Security researchers at Volexity have uncovered multiple Russian threat actors conducting sophisticated social engineering and spear-phishing campaigns targeting Microsoft 365…

Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number
17
Feb
2025

Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number

The Indian Post Office portal was found vulnerable to an Insecure Direct Object Reference (IDOR) attack, exposing sensitive Know Your…

Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment
17
Feb
2025

Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment

A sophisticated cyber threat has emerged in recent weeks, targeting unsuspecting users with fake Outlook troubleshooting calls. These calls, designed…

A Free Cybersecurity Lab for Security Teams To Analyse Cyber Threats
17
Feb
2025

A Free Cybersecurity Lab for Security Teams To Analyse Cyber Threats

In a significant step forward for cybersecurity professionals, PurpleLab offers an innovative open-source cybersecurity lab for creating and testing detection…

Threat Actors Leveraging Modified Version of SharpHide Tool To Create Hidden Registry
17
Feb
2025

Threat Actors Leveraging Modified Version of SharpHide Tool To Create Hidden Registry

Threat actors have been utilizing a modified version of the SharpHide tool to create hidden registry values, significantly complicating detection…

Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access
17
Feb
2025

Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access

In a sophisticated cyberattack campaign, a threat actor identified as Storm-2372 has been leveraging Microsoft Teams meeting invites to execute…

Google Chrome AI-Powered Security Now Available for All Users
17
Feb
2025

Google Chrome AI-Powered Security Now Available for All Users

In a significant update, Google has announced that its AI-powered security feature is now available to every Chrome user globally….

Linux Kernel 6.14 rc3 Released
17
Feb
2025

Linux Kernel 6.14 rc3 Released

Linus Torvalds has released Linux Kernel 6.14-rc3, the latest release candidate for the upcoming Linux 6.14 stable version. Paolo Bonzini,…

Beware of Malicious Browser Updates That Installs SocGholish Malware
16
Feb
2025

Beware of Malicious Browser Updates That Installs SocGholish Malware

Cyber threats have evolved significantly in recent years, with malicious actors employing sophisticated tactics to compromise user systems. One such…

North Korean IT Workers Infiltrate International Companies To Plant Backdoors on Systems
16
Feb
2025

North Korean IT Workers Infiltrate International Companies To Plant Backdoors on Systems

North Korean IT workers have been infiltrating international companies by securing remote positions under false identities. This tactic not only…

Lazarus Group Using New Malware Tactic To Attack Developers Globally
16
Feb
2025

Lazarus Group Using New Malware Tactic To Attack Developers Globally

The notorious Lazarus Group in a recent escalation of cyber threats linked to North Korea, has unveiled a sophisticated new…