Category: CyberSecurityNews

Malware App on Google Play
31
Jan
2023

New Malware App on Google Play With Over 20 Million Downloads

Recently the cybersecurity experts at Dr. Web antivirus reported that over 20 million devices have recently downloaded a highly successful…

BIND DNS Software
30
Jan
2023

BIND DNS Software High-Severity Flaw

The Internet Systems Consortium (ISC) released security advisories on January 25, 2023, to address flaws in the DNS software suite…

PlugX Malware Hides on USB Devices
30
Jan
2023

PlugX Malware Hides on Removable USB Devices

An investigation by cyber security experts at Palo Alto Network’s Unit 42 team recently revealed that a variation of PlugX…

Mimic Ransomware Abuses Windows Search
28
Jan
2023

New Mimic Ransomware Abuses Windows Search Engine

A new strain of ransomware named Mimic has been uncovered recently by security experts at Trend Micro in June 2022….

Critical Realtek SDK Vulnerability
27
Jan
2023

Millions of Attacks to Exploit Realtek SDK Vulnerability

In the latter half of 2022, a significant number of cyber attacks utilizing a remote code execution vulnerability in Realtek…

CryptoAPI Spoofing Vulnerability
27
Jan
2023

PoC Exploit Released for Critical CryptoAPI Spoofing Vulnerability

Akamai researchers have made available a demonstration exploit code for a significant vulnerability in Windows CryptoAPI that was identified by…

GoTo Hackers Stole
26
Jan
2023

GoTo Says Hackers Stole Customer Data and Encryption Keys

GoTo, formerly LogMeIn Inc., has acknowledged that a threat actor stole an encryption key that gave access to a portion of…

FBI Confirms Lazarus Group
26
Jan
2023

Lazarus Group Is Responsible For $100M Crypto Theft

It has been officially confirmed by the Federal Bureau of Investigation (FBI) that the cyber-attacks on the cryptocurrency exchange, Harmony…

iOS Zero-Day
25
Jan
2023

Apple Fixes Actively Exploited iOS Zero-Day on iPhones, iPads

In an effort to ensure the safety and security of its customers, Apple has taken the necessary steps to address…

Hackers Use Shapeshifting Tactics
25
Jan
2023

Hackers Use Shapeshifting Tactics to Steal Information

Recently, Cyble Research and Intelligence Labs (CRIL) discovered Aurora Stealer malware imitating popular applications on phishing sites to infect as…

Twitter whistleblower
25
Jan
2023

Twitter Engineers Can Tweet as any Account Using ‘GodMode’

According to The Washington Post, a new Twitter whistleblower has come forward, confirming the alarming evidence from last year regarding the…

IPv6 Security Guidance
25
Jan
2023

NSA Published IPv6 Security Guidance

To assist the Department of Defense (DoD) and other system administrators in identifying and minimising security risks related to the…