Category: CyberSecurityNews

New Tunneling Protocol Vulnerabilities Lets Attackers Hijack Over 4 Million Internet Hosts & VPN
16
Jan
2025

New Tunneling Protocol Vulnerabilities Lets Attackers Hijack Over 4 Million Internet Hosts & VPN

Researchers from Top10VPN report to Cyber Security News that they have uncovered major vulnerabilities in tunneling protocols that allow attackers…

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims in December
16
Jan
2025

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims in December

A new ransomware group called FunkSec has emerged as a dominant force in the cybercrime landscape, claiming to have compromised…

California Wildfire Exploited By Hackers To Launch Phishing Attacks
16
Jan
2025

California Wildfire Exploited By Hackers To Launch Phishing Attacks

As California battles devastating wildfires, cybercriminals are seizing the opportunity to exploit the confusion and uncertainty through sophisticated phishing attacks….

New UEFI Secure Boot Bypass Vulnerability Exposes Systems to Malicious Bootkits
16
Jan
2025

New UEFI Secure Boot Bypass Vulnerability Exposes Systems to Malicious Bootkits

A newly discovered vulnerability, CVE-2024-7344, has been identified as a critical flaw in the UEFI Secure Boot mechanism, potentially impacting…

Hackers Attacking Exploited Thousands of PHP-Based Web Applications to Deploy Malware
16
Jan
2025

Hackers Attacking Exploited Thousands of PHP-Based Web Applications to Deploy Malware

A massive cybersecurity threat has emerged as hackers exploit vulnerabilities in PHP-based web applications to deploy malware on a global…

Veeam Azure Backup Solution Vulnerability Allows Attackers To Enumerate Network
16
Jan
2025

Veeam Azure Backup Solution Vulnerability Allows Attackers To Enumerate Network

A critical security flaw has been discovered in Veeam’s popular backup solution for Microsoft Azure, potentially exposing countless organizations to…

Black Basta Abusing Teams Chat To Initiate Remote Session & Drop Malware
16
Jan
2025

Black Basta Abusing Teams Chat To Initiate Remote Session & Drop Malware

Notorious ransomware group Black Basta has been observed leveraging Microsoft Teams as part of a sophisticated social engineering campaign. This…

Ivanti Endpoint Manager Vulnerabilities Allows Attackers To Extract Sensitive Information
16
Jan
2025

Ivanti Endpoint Manager Vulnerabilities Allows Attackers To Extract Sensitive Information

Ivanti addressed multiple severe vulnerabilities in its Endpoint Manager (EPM) software, potentially exposing organizations to significant data breaches. The most…

Botnet Malware Exploits 13,000 MikroTik Devices By Abusing Misconfigured DNS Records
16
Jan
2025

Botnet Malware Exploits 13,000 MikroTik Devices By Abusing Misconfigured DNS Records

Cybersecurity experts at Infoblox Threat Intel have uncovered a sophisticated botnet leveraging misconfigured DNS records to bypass email protection systems…

2024 CVE Review - "Critical, High, Medium" Position Shifting in Cybersecurity
16
Jan
2025

2024 CVE Review – “Critical, High, Medium” Position Shifting in Cybersecurity

As the calendar turns to 2025, cybersecurity professionals are taking stock of key trends in Common Vulnerabilities and Exposures (CVEs)…

0-Click RCE Vulnerability in Samsung Smartphones Let Attackers Trigger OOB Write - Technical Analysis
16
Jan
2025

0-Click RCE Vulnerability in Samsung Smartphones Let Attackers Trigger OOB Write – Technical Analysis

Google Security researchers have disclosed a critical vulnerability, tagged as CVE-2024-49415, affecting Samsung smartphones last year and reported to Samsung…

Apple Opens Applications for Information Security Internship
16
Jan
2025

Apple Opens Applications for Information Security Internship

If you’re a tech-savvy student eager to start career in cyber security, Apple has just announced an exciting opportunity for…