Category: CyberSecurityNews

Apple Fixes Zero-day Vulnerabilities Exploited To Attack iPhones, Macs, and iPads
25
Jul
2023

Apple Fixes Zero-day Vulnerabilities Exploited To Attack iPhones

Apple has issued security patches to address zero-day vulnerabilities that have been exploited in attacks against iPhones, Macs, and iPads…

Atlassian RCE Flaw Let Attacker Execute Arbitrary Code
25
Jul
2023

Atlassian RCE Flaw Let Attacker Execute Arbitrary Code

On July 18th, Atlassian discovered critical and high vulnerabilities through bug bounty programs, third-party library scans, and penetration testing. In…

Multiple Flaws in Encrypted Police and Military Radios
25
Jul
2023

Multiple Flaws in Encrypted Police and Military Radios

Global radios rely on the TETRA (Terrestrial Trunked Radio) standard, but various vulnerabilities and multiple flaws have been uncovered, impacting…

Hackers Actively Exploiting zero-day Flaw in Ivanti Mobile Endpoint Manager Software
25
Jul
2023

Zero-day Flaw in Ivanti Mobile Endpoint Manager Software

Ivanti ‘s mobile device management software EPMM(Endpoint manager mobile), aka Mobile iron core version lower than 11.8.1.0, was impacted by…

Flipper Zero – Now You Install 3rd-Party Apps With The Pentesting Device
25
Jul
2023

Flipper Zero – Now You Install 3rd-Party Apps

The Flipper Zero team has announced the official launch of “Flipper Apps,” a new app store enabling mobile users to…

ChatGPT for Digital Forensic
25
Jul
2023

ChatGPT for Digital Forensic – AI-Powered Investigation Tool

OpenAI’s ChatGPT (GPT-3.5, GPT-4) and other LLMs like BERT, Bard, etc. have sparked widespread debate due to their disruptive applications…

What is DAST ? How It Works to Secure Your App
25
Jul
2023

What is Dynamic Application Security Testing (DAST) ?

Businesses and developers are focusing more on the security of applications in their digital environment as cyber threats and data…

Google Detailed Dangerous Red Team Attacks to Hack AI Systems
24
Jul
2023

Google Detailed Dangerous Red Team Attacks to Hack AI Systems

Google Detailed Dangerous Red Team Attacks to Hack AI Systems. Pursuing innovation demands clear security standards in the public and…

Sophisticated OSS Supply Chain Attacks Targeting Banking Sector
24
Jul
2023

First-ever Open-Source Software Supply Chain Attacks

Recent reports indicate that the banking sector has become the focus of threat actors utilizing an emerging supply chain attack….

Over 15000+ Citrix Servers Vulnerable to Code Injection Attacks
24
Jul
2023

Over 15000+ Citrix Servers Vulnerable to Code Injection Attacks

Due to an unauthenticated critical RCE bug, formerly exploited as a zero-day in the wild by the threat actors, thousands…

Virustotal Apologizes for the recent customer data leak
24
Jul
2023

Virustotal Apologizes for the Recent Customer Data Leak

The Virustotal platform has issued an apology and provided an update regarding a recent incident of accidental data exposure. VirusTotal…

New Reptile Rootkit Malware Attacking Linux Systems
24
Jul
2023

New Reptile Rootkit Malware Attacking Linux Systems

A new kernel module rootkit malware was released recently on GitHub, dubbed Reptile. It’s an open-source rootkit that has the…