Category: CyberSecurityNews

Critical Vulnerability in WordPress Stripe Payment Plugin Exposes Customer Data
16
Jun
2023

Critical Vulnerability in WordPress Stripe Payment Plugin

The WordPress Stripe Payment Gateway plugin has been vulnerable to Unauthenticated Insecure Direct Object Reference (IDOR) Vulnerability. WooCommerce developed this…

Hackers Employed DNS-over-HTTPS
16
Jun
2023

Chinese Hackers Employed DNS-over-HTTPS for Linux Malware Communication

ChamelGang, a sophisticated threat actor believed to be based in China, has been using different tools for intrusions, as identified…

Russian National Arrested
16
Jun
2023

Russian National Arrested For LockBit Ransomware Attacks

LockBit has become the most reputable ransomware group in recent times. The method by which they operate differs from other…

XSS Vulnerabilities in Azure Services Let Attackers Execute Malicious Scripts
16
Jun
2023

XSS Vulnerabilities in Azure Services Leads to Script Executions

Two severe vulnerabilities in Azure services, Azure Bastion and Azure Container Registry—that allow Cross-Site Scripting (XSS) by leveraging a flaw…

Email Attacks
16
Jun
2023

Hackers Using ChatGPT & GoogleBard to Launch Email Attacks

Researchers uncovered a new phishing email campaign that employs ChatGPT and Google Bard to launch sophisticated email attacks. Threat actors had started relying on…

Russia-Backed Hackers Using New USB-based Malware to Acquire Ukraine’s Military Intelligence
16
Jun
2023

Russia-Backed Hackers Using New USB-based Malware

Ukraine remains under constant threat as the Russian state-sponsored hacking group Shuckworm (aka Armageddon or Gamaredon) continues to carry out…

Mystic Stealer Attacks 40 Web Browsers
16
Jun
2023

Mystic Stealer Attacks 40 Web Browsers & 70 Extensions

A brand-new information stealer named Mystic Stealer appeared in April 2023; nearly 40 web browsers and more than 70 browser extensions…

Hackers Steal Cryptocurrencies Using DoubleFinger Malware Via Weaponized PIF Attachment
13
Jun
2023

Hackers Steal Cryptocurrencies Using DoubleFinger Malware

Stealing cryptocurrencies is a joint event, and a recent addition to this trend is the DoubleFinger loader, which is mainly…

Cost of a Data Breach: Banking and Finance
12
Jun
2023

Cost of a Data Breach: Banking and Finance

The data breach cost reached an all-time high in 2022, as per research, increasing by around 12.7% within just 2 years….

Authentication vs Authorization
11
Jun
2023

What is Difference Between Authentication and Authorization ?

Authentication and Authorization are two terms that are often used interchangeably in the tech world. However, both these terms are…

Half&Half – Intel Processor’s Hidden Security Feature Stop Attack Against Spectre Like Vulnerabilities
11
Jun
2023

Intel Processor’s Hidden Security Feature Uncovered

Computer scientists uncover a previously unknown security feature in Intel processors that provides robust protection against attacks, including the notorious…

New Horabot Malware Steals Banking and Outlook Credentials
09
Jun
2023

New Horabot Malware Steals Banking and Outlook Credentials

Since November 2020, a covert campaign utilizing the ‘Horabot’ botnet malware has specifically targeted Spanish-speaking users across Latin America, infecting…