Category: CyberSecurityNews

EmojiDeploy Vulnerability
20
Jan
2023

EmojiDeploy Vulnerability Let Attackers Execute Remote Code

The use of a set of methods to take advantage of vulnerabilities like misconfigurations and poor security protocols in a…

SYN Attack
20
Jan
2023

What is SYN Attack? How the Attack works and Prevention

TCP SYN Flood attacks are the most popular ones among DDOS attacks. Here we are going to discuss in detail,…

Mailchimp Hacked
19
Jan
2023

Mailchimp Hacked – Attackers Accessed Internal Admin Tool

Another breach has occurred at MailChimp, which allowed threat actors to access 133 customers’ data after hackers gained access to…

Why DDoS Attacks Use IoT Devices as Weapons?
18
Jan
2023

Why DDoS Attacks Use IoT Devices as Weapons?

Indusface saw a 74% increase in the number of websites that experienced DDoS attacks from Q3 to Q4 of 2022….

Azure Services Vulnerability
18
Jan
2023

Microsoft Azure Services Vulnerability Let Attackers Gain Access

Orca recently conducted an investigation into several Microsoft Azure services and discovered four instances where various services were uncovered to…

OAuth 2.0
18
Jan
2023

What is OAuth 2.0 ? How it Works ?

OAuth 2.0 is the industry-standard protocol for authorization. OAuth 2.0 supersedes the work done on the original OAuth protocol created…

Rhadamanthys Stealer Delivered Via a Spam Email
17
Jan
2023

New Infostealer Malware Spreading Through Google Ads

Cyble Research & Intelligence Labs (CRIL) discovered a brand-new malware variant called “Rhadamanthys Stealer.” This malware stealer variation is now…

CIA's Hive Multi-Platform Attack Kit
17
Jan
2023

Threat Actors Using Leaked CIA’s Hive Multi-Platform Attack

It has been reported that a group or individual, whose identity is currently unknown, has released a new “backdoor.” This…

Hackers Use VPN Installers
16
Jan
2023

Hackers Use VPN Installers To Install Surveillanceware Device

The consumer VPN market has seen explosive growth in the last few years due to the increasing popularity of VPN…

Digital Certificates
16
Jan
2023

What are Digital Certificates and How They Protect Website Data

Digital certificates are electronic credential that binds the identity to the owner of the certificate which can also pair the…

IcedID Malware Active Directory
14
Jan
2023

IcedID Malware Let Attackers Compromise the Active Directory

In a recent incident, within just 24 hours of initial access, the IcedID (aka BokBot) malware was used to successfully…

Kerberos Authentication
13
Jan
2023

What is Kerberos Authentication, How it Works?

Kerberos authentication is a cryptography-based protocol that is used to secure logins. The Kerberos is a mythological three-headed Greek creature….