Category: CyberSecurityNews

Hackers Exploiting Fortinet FortiGate Firewalls Using Zero-Day Vulnerability
14
Jan
2025

Hackers Exploiting Fortinet FortiGate Firewalls Using Zero-Day Vulnerability

Cybersecurity firm Arctic Wolf has disclosed details of an ongoing cyber campaign targeting Fortinet FortiGate firewall devices with exposed management…

New Ransomware Encrypts Amazon S3 Buckets Using SSE-C Encryption
14
Jan
2025

New Ransomware Encrypts Amazon S3 Buckets Using SSE-C Encryption

A new ransomware campaign has surfaced, leveraging Amazon Web Services’ (AWS) Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt…

UK Domain Registry Nominet Confirms Cyber Attack Exploiting Ivanti RCE Zero-Day
14
Jan
2025

UK Domain Registry Nominet Confirms Cyber Attack Exploiting Ivanti RCE Zero-Day

Nominet, the official registry for .uk domain names and one of the largest country code registries globally has disclosed a…

OneBlood Confirms Ransomware Attack - Donor's Personal Information Stolen
14
Jan
2025

OneBlood Confirms Ransomware Attack – Donor’s Personal Information Stolen

OneBlood, a major blood donation nonprofit serving the southeastern United States, has confirmed a significant data breach resulting from a…

CISA Adds 2 New Known Vulnerabilities That Actively Exploited in The Wild
14
Jan
2025

CISA Adds 2 New Known Vulnerabilities That Actively Exploited in The Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog with two new critical vulnerabilities,…

Rootkit Malware Exploiting Zero-day Vunlerabilities to Control Linux Systems Remotely
13
Jan
2025

Rootkit Malware Exploiting Zero-day Vunlerabilities to Control Linux Systems Remotely

Fortinet researchers uncovered an advanced rootkit malware exploiting multiple zero-day vulnerabilities in enterprise appliances by executing a shell script (Install.sh)….

New macOS Vulnerability Lets Attackers Bypass Apple’s System Integrity Protection (SIP)
13
Jan
2025

New macOS Vulnerability Lets Attackers Bypass Apple’s System Integrity Protection (SIP)

Microsoft Threat Intelligence has identified a significant vulnerability in macOS that could allow attackers to bypass Apple’s System Integrity Protection…

BeyondTrust Privileged Remote Access Vulnerability Actively Exploited in the Wild
13
Jan
2025

BeyondTrust Privileged Remote Access Vulnerability Actively Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical OS command injection vulnerability (CVE-2024-12686) found in BeyondTrust’s Privileged…

CISA Releases A New Free Guide For OT Products Security
13
Jan
2025

CISA Releases A New Free Guide For OT Products Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has launched a new guidance document to enhance cybersecurity for operational technology…

Attackers Allegedly Steal 2.3 GB Of Internal Data
13
Jan
2025

Attackers Allegedly Steal 2.3 GB Of Internal Data

Spanish telecommunications giant Telefonica has confirmed a significant breach of its internal systems, with attackers claiming to have stolen approximately…

Microsoft Multi-Factor Authentication Down Blocking Office 365 Users Access
13
Jan
2025

Microsoft Multi-Factor Authentication Down Blocking Office 365 Users Access

Microsoft has alerted users to an issue with its Multi-Factor Authentication (MFA) system, which has disrupted access to certain Microsoft…

Aviatrix Controller RCE Vulnerability Exploited In The Wild
13
Jan
2025

Aviatrix Controller RCE Vulnerability Exploited In The Wild

A critical remote code execution (RCE) vulnerability, CVE-2024-50603, has been actively exploited in the wild, posing significant risks to cloud…