Category: CyberSecurityNews

TAG-124 Hacked 1000+ Wordpress Sites To Embed Payloads
31
Jan
2025

TAG-124 Hacked 1000+ WordPress Sites To Embed Payloads

A sophisticated cyber campaign orchestrated by the threat group TAG-124 has compromised over 1,000 WordPress websites to deploy malicious payloads….

New York Blood Center Hit By Ransomware Attack
31
Jan
2025

New York Blood Center Hit By Ransomware Attack

The New York Blood Center Enterprises (NYBC), a vital organization responsible for supplying blood and blood products to hospitals across…

Hackers Abusing GitHub Infrastructure to Deliver Lumma Stealer
31
Jan
2025

Hackers Abusing GitHub Infrastructure to Deliver Lumma Stealer

Cybersecurity researchers have uncovered a sophisticated campaign leveraging GitHub’s trusted release infrastructure to distribute the Lumma Stealer malware. This information-stealing…

DeepSeek's Growing Influence Sparks a Surge in Frauds and Phishing Attacks
31
Jan
2025

DeepSeek’s Growing Influence Sparks a Surge in Frauds and Phishing Attacks

The rapid rise of DeepSeek, a Chinese artificial intelligence (AI) company, has not only disrupted the AI industry but also…

Coyote Banking Malware Weaponizing Windows LNK Files To Execute Malicious Scripts
31
Jan
2025

Coyote Banking Malware Weaponizing Windows LNK Files To Execute Malicious Scripts

A new wave of cyberattacks leveraging the Coyote Banking Trojan has been identified, targeting financial institutions in Brazil. This sophisticated…

Cisco’s Webex Chat Vulnerabilities Let Attackers Access Organizations Chat Histories
31
Jan
2025

Cisco’s Webex Chat Vulnerabilities Let Attackers Access Organizations Chat Histories

Cisco’s Webex Chat (formerly known as IMI Chat) was found to have a significant security flaw that exposed the sensitive…

Malware Found in Healthcare Patient Monitors Linked to Chinese IP Address
31
Jan
2025

Malware Found in Healthcare Patient Monitors Linked to Chinese IP Address

A critical cybersecurity vulnerability has been uncovered in Contec CMS8000 patient monitors, revealing embedded malware that poses significant risks to…

D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely
31
Jan
2025

D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely

A critical unauthenticated Remote Code Execution (RCE) vulnerability has been affecting DSL-3788 routers, allowing attackers to acquire complete control over…

Microsoft to Boost M365 Bounty Program With New Products & Rewards Up to $27,000
31
Jan
2025

Microsoft to Boost M365 Bounty Program With New Products & Rewards Up to $27,000

A significant extension of Microsoft’s Microsoft 365 (M365) Bounty Program has been announced. The program now includes new Viva products…

Authorities Take Down Cracked & Nulled Hacking Forums Used by 10 Million Users
31
Jan
2025

Authorities Take Down Cracked & Nulled Hacking Forums Used by 10 Million Users

In a law enforcement operation dubbed “Operation Talent,” an international coalition of law enforcement agencies led by Germany’s Bundeskriminalamt (BKA)…

Windows Vulnerability in COM Objects Let Attackers Trigger Remote Command Execution
31
Jan
2025

Windows Vulnerability in COM Objects Let Attackers Trigger Remote Command Execution

James Forshaw of Google Project Zero has shed light on a significant security vulnerability in Windows related to accessing trapped…

Tata Technologies Hacked - Ransomware Attack Compromises IT Systems
31
Jan
2025

Tata Technologies Hacked – Ransomware Attack Compromises IT Systems

In a recent disclosure to the stock exchanges, Tata Technologies Limited announced that it has been the victim of a…