Category: CyberSecurityNews

Detecting Malicious HTTP Traffic that Hides Within the Real Traffic
12
Sep
2023

Detecting Malicious HTTP Traffic that Hides Under the Real Traffic

The malware generates malicious network behavior, often hiding it in HTTP traffic to avoid detection. So, in cyber security, detecting…

Cyber Attack at MGM Systems Forces IT Systems Shutdown
12
Sep
2023

Cyber Attack at MGM Systems Forces IT Systems Shutdown

In a recent development, MGM Resorts, a prominent hotel and casino giant, has confirmed the presence of a cybersecurity issue…

Chrome Patched Zero-day Flaw That Exploits in the Wild: Update Now!
12
Sep
2023

Patches Widely Exploited Zero-Day Flaw

Google has upgraded the Stable and Extended stable channels to 116.0.5845.187 for Mac and Linux and 116.0.5845.187/.188 for Windows as…

Loda Malware Attacks Windows To Control RDP, Spread Malware
12
Sep
2023

Loda Malware Attacks Windows To Control RDP, Spread Malware

Threat actors have been actively employing Loda, a remote access trojan (RAT) developed in AutoIT, an accessible language for automating…

Massive Ransomware Attack on SriLanka Wipes Out Months of Data
12
Sep
2023

Massive Ransomware Attack on SriLanka Wipes Out Data

The Information and Communication Technology Agency (ICTA) has officially confirmed a severe data loss incident that has had a far-reaching…

Airbus Cyber Attack
12
Sep
2023

Over 3,200 Vendor Data Accessed by Hackers

According to recent reports, a threat actor has compromised the confidential information of 3,200 Airbus vendors. The exposed data includes…

Proton Mail Vulnerabilities Would Allow Attackers to Steal Emails
11
Sep
2023

Proton Mail Vulnerabilities Would Allow Attackers to Steal Emails

A group of Researchers unearthed critical code Proton Mail vulnerabilities that could have jeopardized the security of Proton Mail, a…

Weaponized Telegram App
11
Sep
2023

Weaponized Telegram App Infected Over 60K Android Users

Telegram Messenger offers global, cloud-based instant messaging with several features:- Optional end-to-end-encryption Video calling VoIP File sharing Cybersecurity researchers at…

Akira Ransomware Attacks Exploit Zero-Day Cisco ASA Vulnerability
11
Sep
2023

Akira Ransomware Attacks Exploit Vulnerability in Cisco ASA

In recent developments, reports have surfaced regarding the Akira ransomware threat actors targeting Cisco VPNs lacking multi-factor authentication (MFA).  This…

HPE OneView Vulnerability Let Attacker Bypass Authentication
11
Sep
2023

HPE OneView Vulnerability Let Attacker Bypass Authentication

In the Hewlett Packard Enterprise OneView Software, three security flaws have been identified, which might be remotely exploited to allow…

Eve - Stealing Wi-Fi Passwords by Eavesdropping
10
Sep
2023

Eve – Stealing Wi-Fi Passwords by Eavesdropping

Mobile devices and apps play a growing role in user identification, but password theft, resembling identity theft, invites diverse eavesdropping…

Hackers Using ChatGPT to Generate Malware & Social Engineering Threats
10
Sep
2023

Hackers Using ChatGPT to Generate Malware & Social Engineering Threats

Large language models (LLMs) and generative AI are rapidly advancing globally, offering great utility but also raising misuse concerns. The…