Category: CyberSecurityNews

Endpoint Security Best Practices
15
Jul
2023

Endpoint Security Best Practices – 2023

In today’s age of widespread device collaboration, the number of endpoints within an organization is often enormous. On top of…

Microsoft Struggling to Find How Hackers Steal the Azure AD Signing Key
15
Jul
2023

Microsoft Struggling to Find How Hackers Steal the Azure AD Signing Key

China’s Storm-0558 hacked 25 organizations, including government agencies, using fake tokens for email access, aiming at espionage since May 15,…

Hackers Use WebAPK to Install Malware
14
Jul
2023

Hackers Use WebAPK to Install Malware as Native Application

The latest research reveals a new sophisticated attack carried through Webapk technology targeting Android devices. The threat actors manipulate the…

Hackers Actively Exploiting Zero-day Vulnerability in Zimbra Server
14
Jul
2023

Hackers Actively Exploiting Zero-day Vulnerability in Zimbra Server

Zimbra is a widely used email client used by many organizations worldwide. The Zimbra Collaboration Suite provides a much more…

hackers use WormGPT to Launch Sophisticated Cyber Attacks
14
Jul
2023

hackers use WormGPT to Launch Sophisticated Cyber Attacks

Generative AI technology is rapidly growing and advancing, driven by continuous research and development efforts. But, besides the growing advancements…

Cisco SD-WAN vManage Flaw: Let Attackers Escalate Privileges
14
Jul
2023

Cisco SD-WAN vManage Flaw: Let Attackers Escalate Privileges

A critical severity vulnerability has been detected in the request authentication validation for the REST API of the Cisco SD-WAN…

Information Security Threats
14
Jul
2023

Top Information Security Threats for Businesses 2023

Businesses face a myriad of information security risks that can be detrimental to their operations. Information security threats evolve rapidly,…

Hackers Use New .NET Loader Malware to Deliver Payloads
14
Jul
2023

Hackers Use New .NET Loader Malware to Deliver Payloads

An unrecorded .NET Loader was identified during routine threat hunting that downloads, decrypts, and executes a wide range of malicious…

APT Groups Actively Targeting Outlook Online
13
Jul
2023

APT Groups Actively Targeting Outlook and Exchange Email

A china based APT actor accessed Microsoft 365 cloud environment and exfiltrated unclassified Exchange Online Outlook data from a small number…

Russian Cyber Playbook
13
Jul
2023

5 Phases of Russian Cyber Playbook in Attacks Against Ukraine

Russia’s invasion of Ukraine on February 24, 2022, followed escalating cyber operations, categorized into six phases, by Russian troops amassed…

QuickBlox Security Flaws
13
Jul
2023

QuickBlox Security Flaws Exposes Millions of Users Sensitive Data

Recent reports from Team82 and Check Point Research (CPR) team state that there has been a major vulnerability in QuickBlox…

Ransomware Payments Record High
13
Jul
2023

Ransomware Payments are at a Record High for 2023

The significant plunge in cyber crimes shows a decent rise in legitimate services in the mid of this year, 2023….