Category: CyberSecurityNews

Mass phishing campaign utilizing QR codes to Steal Employees Microsoft credentials
22
Aug
2023

Attackers Weaponizing QR Codes to Steal Microsoft Credentials

A recent discovery highlights a significant QR code phishing campaign that targets Microsoft credentials across various industries.  Notably, a major…

Smart Bulbs Hacked
22
Aug
2023

Smart Bulbs can be Hacked to Steal Wi-Fi Passwords

The current rise of the Internet of Things (IoT) is at its peak and rapidly expanding its abilities by transforming…

Federated Learning Based IDS - Key Challenges and Future Paths
22
Aug
2023

Federated Learning Based IDS – Key Challenges and Future Paths

In today’s digital era, AI (Artificial Intelligence) and ML (Machine Learning) applications are one of the key developments.  But, with…

Tesla Data Breach - 75,000+ Users Information Details Exposed
22
Aug
2023

Tesla Data Breach – 75,000+ Users Information Details Exposed

Tesla designs and manufactures several EV products, but what sets it apart from others is its cars, which are feature…

SEIKO Data Breach: BlackCat Group Claims Responsibility
21
Aug
2023

SEIKO Data Breach – BlackCat Group Claims Responsibility

The well-known watch manufacturing company Seiko disclosed the data breach notification recently on Aug 2023, targeted by the notorious threat…

Mass Phishing Campaign Attacking Zimbra email users’ to Steal Login Credentials
21
Aug
2023

Mass Phishing Campaign Attacking Zimbra email users

A group of researchers recently published a significant mass-spreading phishing campaign. It targets Zimbra account users, shedding light on a…

WinRAR Flaw Let Attackers Execute Remote Code: Update Now!
21
Aug
2023

WinRAR Flaw Let Attackers Execute Remote Code: Update Now!

An arbitrary code execution vulnerability was discovered in WinRAR, which can be exploited by opening a specially crafted RAR file….

Users Monitoring Best Practices
20
Aug
2023

Top Privileged Users Monitoring Best Practices

Privileged users typically hold crucial positions within organizations. They usually have elevated access, authority, and permission levels in the organization’s…

Choosing the Right Mobile Testing Tools: A Comprehensive Guide
20
Aug
2023

Choosing the Right Mobile Testing Tools: A Comprehensive Guide

Mobile application testing is the very process of analyzing the operation, efficiency, and accessibility of mobile apps to make sure…

Threat and Vulnerability Roundup for the week of August 13th to 19th
20
Aug
2023

Threat and Vulnerability Roundup for the week of August 13th to 19th

Welcome to Cyber Writes’ weekly Threat and Vulnerability Roundup, where we provide the most recent information on cybersecurity news. Take…

Hackers Breached US Air Force Satellite
19
Aug
2023

Hacking Crew Breached the US Air Force Satellite In Orbit

This year’s Hack-A-Sat competition challenged teams to hack into an actual satellite in orbit. The US Air Force Moonlighter, which…

Critical Citrix ShareFile Flaw Exploited in the Wild: CISA Warns
18
Aug
2023

Critical Citrix ShareFile Flaw Exploited in the Wild: CISA Warns

Citrix ShareFile is a cloud-based platform used by organizations to store and share large files. It also allows users to…