Category: CyberSecurityNews

Best Practices for Event Logging & Threat Detection
24
Aug
2024

Best Practices for Event Logging & Threat Detection

The National Security Agency (NSA) has released the Best Practices for Event Logging and Threat Detection across cloud services, enterprise…

Microsoft Edge RCE Vulnerability Let Attackers Take Control of the System Remotely
23
Aug
2024

Microsoft Edge RCE Vulnerability Let Attackers Take Control of the System

A critical remote code execution (RCE) vulnerability in Microsoft Edge has been discovered. It could allow attackers to take control…

Dell Power Manager Vulnerability Allow Attackers Gain Unauthorized Access – Patch Now!
23
Aug
2024

Dell Power Manager Vulnerability Allow Attackers Gain Unauthorized Access

Dell Technologies has identified a security vulnerability in Dell Power Manager (DPM), affecting versions 3.15.0 and prior. This vulnerability, identified…

Hackers Exploiting Amazon Services To Deliver Weaponized MSC Files
23
Aug
2024

Hackers Exploiting Amazon Services To Deliver Weaponized MSC Files

Hackers often target and exploit Amazon services due to their vast offerings, including massive computer power, storage, and global reach….

Cthulhu Stealer macOS Malware can be Renting for 0/Month to Steal Data
23
Aug
2024

Cthulhu Stealer macOS Malware can be Renting for $500/Month to Steal Data

In recent years, the belief that macOS systems are immune to malware has been increasingly challenged. With the emergence of…

ransomware
23
Aug
2024

Russian Karakurt Ransomware Group Member Charged For Laundered Ransom Payment

A member of a notorious Russian cybercrime group has been charged federally and appeared in U.S. District Court in Cincinnati…

Beware of Malicious Slack Ads that Deliver Malicious Payloads
23
Aug
2024

Beware of Malicious Slack Ads that Deliver Malicious Payloads

Cybercriminals have been exploiting Google search ads to deliver malicious payloads through seemingly legitimate ads for the popular communication tool…

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware
23
Aug
2024

INE Security Launches Initiatives to Invest in the Education of Aspiring Cybersecurity Professionals

INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing…

Chinese Hackers Exploiting Zero-Day Flaw in Cisco Switches to Deploy Malware
23
Aug
2024

Chinese Hackers Exploiting Zero-Day Flaw in Cisco Switches

A sophisticated China-linked cyber espionage group, known as Velvet Ant, has been discovered exploiting a zero-day vulnerability in Cisco NX-OS…

McDonald
23
Aug
2024

McDonald’s Official Instagram Account Hacked to Promote Cryptocurrency Scam

On August 21, 2024, McDonald’s official Instagram account was hacked, resulting in a cryptocurrency scam that made the hackers around…

North Korean Hackers Unveils New MoonPeak Malware With Updated Tactics
22
Aug
2024

North Korean Hackers Unveils New MoonPeak Malware With Updated Tactics

Cisco Talos has uncovered a new remote access trojan (RAT) family, which is XenoRAT-based malware that is under active development…

New Malware Hidden Within PostgreSQL Process Deploys Cryptocurrency Miners
22
Aug
2024

New Malware Hidden Within PostgreSQL Process Deploys Cryptocurrency Miners

A successful brute-force attack on a PostgreSQL database exploited a feature that allowed command execution, where the attacker created a…