Category: CyberSecurityNews

No-Code SaaS
31
Aug
2023

No-Code SaaS Security Breach Prevention Guide in 2023

With the growing trend of businesses transitioning their operations to cloud-based Software as a Service (SaaS) platforms, ensuring the security…

Cisco Unified Communications Products Flaw Let Attackers Escalate Privileges
31
Aug
2023

Cisco Unified Communications Products Flaw

A recent discovery has highlighted a privilege escalation vulnerability within Cisco Unified Communications Products. This vulnerability was found during internal…

Multiple Flaws VMware in Aria Operations for Networks Let Attackers Bypass Authentication
30
Aug
2023

Multiple Flaws in VMware Aria Operations for Networks

As per reports, VMware has been reported with two critical vulnerabilities that could allow threat actors to perform an authentication…

Don't Let Deviant Devices Dismantle your Cyber-Defense
30
Aug
2023

Don’t Let Deviant Devices Dismantle your Cyber-Defense

Although the use of peripheral devices has risen to unparalleled rates in the post-pandemic period, many organizations have failed to…

FBI Dismantle the Notorious Qakbot Infrastructure Used For Ransomware Attacks
30
Aug
2023

FBI Dismantle Qakbot Infrastructure Used For Ransomware Attacks

The FBI and the Justice Department have declared a global effort to disrupt and dismantle the Qakbot infrastructure, which is…

Five Families – Hackers Collaborate to Launch Notorious Cyber Attack
30
Aug
2023

Five Families – Hackers Collaborate to Launch Cyber Attack

The Five Families unites the underground internet world, adopting the name of the 1950s-60s New York mafia’s Italian-American clans. This…

Hackers using HTML Smuggling Technique to Deliver Ransomware and Evade Detection
29
Aug
2023

Hackers using HTML Smuggling Technique to Deliver Ransomware

Threat actors adopt the highly invasive techniques of HTML smuggling to launch  Nokoyawa ransomware despite being delivered through macro and…

How Hackers Abusing ChatGPT For Their Cybercriminal Activities
29
Aug
2023

How Hackers Abusing ChatGPT For Their Cybercriminal Activities

Media and frequent innovative releases aggressively fuel the rapid industry rise of generative AI (Artificial Intelligence) ChatGPT.  But, besides its…

Kroll Experiences Data Breach After Employee Is Hacked Via SIM-Swap Attack
29
Aug
2023

Employee Hacked Via SIM Swap Attack

A high-profile cyber attack targeted a prominent company, Kroll. This attack utilized a sophisticated technique known as “SIM swapping,” which allowed…

DuoLingo Users
29
Aug
2023

Over 2.6 Million DuoLingo Users’ Info Exposed in a Hacker’s Forum

The popular language learning platform has come under scrutiny as a post on a hacker’s forum offers access to information…

what is it? Your Defense Against Exploits &Threats
29
Aug
2023

what is it? Your Defense Against Exploits &Threats

You might discover hundreds of open doors if you scan your website for security vulnerabilities. Our AppSec research across 1400 websites protected…

Researchers Uncover New technique to Detect Malicious Websites
29
Aug
2023

Researchers Uncover New technique to Detect Malicious Websites

The internet domains serve as a launchpad for threat actors to launch several cyber attacks. By exploiting the internet domains…