Category: CyberSecurityNews

shelLM – A New AI-Based Honeypot to Engage Attackers as a Real System
05
Sep
2023

AI-Based Honeypot to Engage Attackers as Real System

A honeypot is a trap on a network that lures and studies cyber-attack techniques of threat actors, alerting defenders to…

Freecycle Urges Users to Change Passwords Following Data Breach
05
Sep
2023

Freecycle Urges Users to Change Passwords Following Data Breach

Freecycle, a popular online platform for giving away and receiving free items, reported a significant data breach.  The Freecycle Network…

Hackers Exploit Pre-Authentication RCE Vulnerabilities in Adobe ColdFusion
05
Sep
2023

Hackers Exploit Pre-Authentication RCE Flaws in Adobe ColdFusion

Adobe ColdFusion is a Java-based, commercial web app development platform using CFML for server-side programming. ColdFusion is primarily known for…

IBM Security Verify Flaw Let Attacker Obtain Sensitive Information
04
Sep
2023

Vulnerability in IBM Security Verify Let Attacker Extract Sensitive Information

Multiple Information Disclosure vulnerabilities were discovered in the IBM Security Verify Information Queue, which can reveal several internal product details….

Apple Opens Application for Security Research Device Program
04
Sep
2023

Apple Opens Application for Security Research Device Program

Apple launched the Security Research Device (SRD) program, enabling security researchers to examine the security features of a specially-built hardware…

Sophisticated Earth Estries Group Hack Government Agencies and Tech Companies
04
Sep
2023

Earth Estries Group Hack Govt Agencies & Tech Companies

A new sophisticated cyber espionage group named Earth Estries, which overlaps notorious threat group FamousSparrow, was unveiled. The group has…

Hackers Attacking MSSQL Servers To Deploy Ransomware
04
Sep
2023

Hackers Attacking MSSQL Servers To Deploy Ransomware

Recently, threat actors have been utilizing brute force attacks to compromise exposed MSSQL databases to distribute the FreeWorld ransomware. This attack…

Beware of New Fileless Malware that Propagates Through Spam Mail
04
Sep
2023

Beware of New Fileless Malware that Propagates Via Spam Mail

Recent reports suggest threat actors have used phishing emails to distribute fileless malware. The attachment consists of a .hta (HTML…

North Korea's Hacker Group Deploys Malicious in PyPI Repository
02
Sep
2023

North Korea’s Hacker Group Deploys Malicious in PyPI Repository

ReversingLabs spotted “VMConnect” in early August, a malicious supply chain campaign with two dozen rogue Python packages on PyPI. It’s…

SapphireStealer .NET Malware
02
Sep
2023

SapphireStealer Malware Capable of Stealing Sensitive

SapphireStealer is an open-source information stealer that may be utilized for obtaining sensitive information, such as corporate credentials, which are frequently…

Junos OS Flaw Allows a network-based Attacker to Launch DoS Attack
01
Sep
2023

Junos OS Flaw Allows a Attacker to Launch DoS Attack

Junos OS and Junos OS Evolved have been found to be vulnerable to a DoS (Denial of Service) condition, which…

Attacker Gained Admin Access to AI Coding platform Sourcegraph Via Leaked Token
01
Sep
2023

AI Coding Platform Sourcegraph Breached

On August 30, 2023, a malicious actor gained unauthorized access to specific Sourcegraph(.)com data through a leaked admin access token….