Category: CyberSecurityNews

Nessus Vulnerability Let Attackers Alter Rules Variables
21
Nov
2023

Nessus Vulnerability Let Attackers Alter Rules Variables

An arbitrary file write vulnerability has been discovered in Nessus, which allows an authenticated, remote attacker to perform a denial…

Hackers Infect Linux Machines via Apache ActiveMQ Vulnerability
21
Nov
2023

Hackers Infect Linux Machines via Apache ActiveMQ Vulnerability

Apache ActiveMQ is a Java-based open-source protocol that allows distributed applications to exchange messages. It uses the JMS API to…

LitterDrifter Powershell Worm Rapidly Spreads on USB Drives
20
Nov
2023

LitterDrifter Powershell Worm Rapidly Spreads on USB Drives

Gamaredon (aka Primitive Bear, ACTINIUM, and Shuckworm) stands out in Russian espionage by exclusively targeting Ukrainian entities. Unusually evident, it…

Splunk RCE Vulnerability Let Attackers Upload Malicious File
20
Nov
2023

Splunk RCE Vulnerability Let Attackers Upload Malicious File

A high-severity Remote Code Execution (RCE) flaw in Splunk Enterprise has been discovered, enabling an attacker to upload malicious files. Versions…

Hackers Exploit Google Workspace to Exfiltrate Data
20
Nov
2023

Hackers Exploit Google Workspace to Exfiltrate Data

Recent research into Google Workspace and Google Cloud Platform by Bitdefender Labs reveals novel attack methods, potentially leading to network-wide…

Hackers Exploiting Zimbra 0-day to Attack
20
Nov
2023

Hackers Exploiting Zimbra 0-day to Attack

Zimbra Collaboration is an open-source solution software suite with an email server and web client for collaboration.  Over 5,000 companies…

FBI Shares Techniques Used by Scattered Spider Hacker Group
17
Nov
2023

FBI Shares Techniques Used by Scattered Spider Hacker Group

In recent months, the Scattered Spider hacking group (aka Starfraud, UNC3944, Scatter Swine, and Muddled Libra) has made news for…

Malware Discovered in Kids' Tablet steals sensitive data
17
Nov
2023

Malware Discovered in Kids’ Tablet steals sensitive data

In the ever-expanding market of Android devices, the allure of budget-friendly options can sometimes conceal unforeseen risks.  Purchasing Android devices…

FortiSIEM Injection Flaw - Attackers Execute Malicious Commands
17
Nov
2023

FortiSIEM Injection Flaw – Attackers Execute Malicious Commands

OS command injection is a security vulnerability where an attacker exploits improper user input validation to inject malicious commands into…

ChatGPT for Malware Analysis: Enhancing GPT’s Ability
16
Nov
2023

ChatGPT for Malware Analysis: Enhancing GPT’s Ability

GPT excels in verbal thinking, skillfully choosing precise words for optimal responses. Understanding this key property is crucial, as much…

Google Chrome Use after free Vulnerability leads to Browser Crash
16
Nov
2023

Google Chrome Use after free Vulnerability leads to Browser Crash

Google Chrome Stable Channel Update for Desktop version 119.0.6.45.159 for Mac and Linux and 119.0.6045.159/.160 for Windows has been released,…

Kubernetes Windows Nodes Flaw Let Attacks Gain Admin Privilege
16
Nov
2023

Kubernetes Windows Nodes Flaw Let Attacks Gain Admin Privilege

As previously reported, three high-severity vulnerabilities in Kubernetes existed in Ingress controllers for NGINX. In addition to this, another high-severity…