Category: CyberSecurityNews

Over 60% of AWS Environments Exposed to Zenbleed Attacks
28
Jul
2023

Over 60% of AWS Environments Exposed to Zenbleed Attacks

AMD Zenbleed 2 processors were found vulnerable to use-after-free flaws, enabling data theft. While the exploitation of this flaw demands…

ModSecurity WAF Flaw Let Hackers Trigger DoS Attack
28
Jul
2023

ModSecurity WAF Flaw Let Hackers Trigger DoS Attack

Trustwave’s open-source Web Application Firewall (WAF) engine, ModSecurity, faces DoS risk due to four transformation actions vulnerability. Cybersecurity researchers at…

Hackers Exploit Windows Search
28
Jul
2023

Hackers Exploit Windows Search Feature to Execute Malware

Malware authors persistently seek novel approaches to exploit unsuspecting users in the active cyber threat landscape. To easily locate all…

Hackers distribute PurpleFox Malware Using MS-SQL Servers
28
Jul
2023

Hackers distribute PurpleFox Malware Using MS-SQL Servers

The purple fox malware has been active since 2018, adopting a new technique to deliver its payload through MS SQL…

New Black Hat AI Tool Launched by Cybercriminals
27
Jul
2023

New Black Hat AI Tool Launched by Cybercriminals

Along with tech companies, cybercriminals are also actively leveraging generative AI models for creating AI-powered chatbots. The growing rise of…

API Security – Top 4 Challenges Faced by CISOs
26
Jul
2023

API Security – Top 4 Challenges Faced by CISOs

CISOs recognize the importance of integrating web applications and API security to protect sensitive customer data while facilitating seamless business…

Over 19 Million Password Logs Sold on the Dark Web and Telegram
26
Jul
2023

Over 19 Million Password Logs Sold on the Dark Web and Telegram

The rapid increase of info stealers has emerged as a major risk for organizations, including chatGPT, and has led to…

How it Assists Attackers & Security Analysts
26
Jul
2023

How it Assists Attackers & Security Analysts

OpenAI’s ChatGPT, released in November 2022, stunned users with its diverse capabilities, answering questions and crafting custom essays, sparking widespread…

Cryptojacking Attack Patterns Checklist for Administrators
26
Jul
2023

Cryptojacking Attack Patterns Checklist for Administrators

Cloud cryptojacking disguises itself as cloud computing resource abuse, where threat actors exploit legitimate tenants for cryptocurrency mining using their…

Ecommerce Security Threats
26
Jul
2023

Top 7 Ecommerce Security Threats in 2023

The ecommerce industry is on the rise. According to Statista, global e-commerce sales amounted to approximately $5.2 trillion. Moreover, experts…

Thales to Acquired application cybersecurity company Imperva in a .6 billion deal
26
Jul
2023

Thales to Acquired company Imperva in a $3.6 billion deal

Thales has acquired a prominent cybersecurity company situated in the United States, renowned for its proficiency in data and application…

Hackers Mimic Popular VPN Download page to Deliver Malware
26
Jul
2023

Hackers Mimic Popular VPN Download page to Deliver Malware

As per reports, threat actors have been using domestic VPN installation files for distributing SparkRAT malware which leads to MeshAgent…