Category: CyberSecurityNews

Windows Zero-days & Firefox Vulnerability Exploited by RomCom Hackers Group
26
Nov
2024

Windows Zero-days & Firefox Vulnerability Exploited by RomCom Hackers Group

Russian-aligned hacking group RomCom has been discovered exploiting two critical zero-day vulnerabilities affecting Mozilla Firefox and Windows systems in a…

Hackers Weaponizing Typosquatted Libraries To Inject SSH Backdoors
26
Nov
2024

Hackers Weaponizing Typosquatted Libraries To Inject SSH Backdoors

A sophisticated attack targeting npm users has been recently uncovered by the Socket’s threat research team in a concerning development…

Kansas City Man Charged for Hacking Computer Systems of Health Clubs
26
Nov
2024

Kansas City Man Charged for Hacking Computer Systems of Health Clubs

A 31-year-old Kansas City man has been indicted on federal charges for allegedly hacking into the computer systems of a…

Palo Alto Networks Faces Critical Security Flaw In GlobalProtect App
26
Nov
2024

Palo Alto certification validation Flaw Let Attackers Escalate Privilege

A significant security vulnerability has been discovered in Palo Alto Networks’ GlobalProtect app, potentially allowing attackers to escalate privileges on…

WordPress Plugin Flaw Exposes 200,000 WordPress Sites To Hacking
26
Nov
2024

WordPress Plugin Flaw Exposes 200,000 WordPress Sites To Hacking

A critical vulnerability was discovered on October 30th, 2024 in the Anti-Spam by CleanTalk WordPress plugin, potentially affecting over 200,000…

CISA Details Red Team's Activity Including TTPs & Network Defense
26
Nov
2024

CISA Details Red Team’s Activity Including TTPs & Network Defense

A comprehensive Red Team Assessment (RTA) was conducted recently by the Cybersecurity and Infrastructure Security Agency (CISA) on a critical…

7 New Flaws In Android & Google Pixel Devices Let Attackers Elevate Privileges
26
Nov
2024

7 New Flaws In Android & Google Pixel Devices Let Attackers Elevate Privileges

Seven critical vulnerabilities affecting Android and Google Pixel devices were recently uncovered during a recent analysis of mobile applications. These…

Starbucks Hit by Ransomware Attack Via Third-party Software Supplier
26
Nov
2024

Starbucks Hit by Ransomware Attack Via Third-party Software Supplier

A ransomware attack on Blue Yonder, a critical supply chain management software provider, has forced Starbucks to revert to manual…

Critical QNAP Vulnerability Let Attackers Execute Remote Code
25
Nov
2024

Critical QNAP Vulnerability Let Attackers Execute Remote Code

Multiple vulnerabilities have been identified in QNAP’s QuRouter, specifically affecting version 2.4.x. The vulnerabilities are tracked as CVE-2024-48860 and CVE-2024-48861,…

Hackers Abuse Avast Anti-Rootkit driver To Evade Detection
25
Nov
2024

Hackers Abuse Avast Anti-Rootkit driver To Evade Detection

A malicious campaign has been discovered in which the malware employs a more nefarious tactic, dropping the legitimate Avast Anti-Rootkit…

What is Denial of Service(DoS) Attack?
25
Nov
2024

What is Denial of Service(DoS) Attack?

The rapid growth of the internet and connected systems has revolutionized the way we communicate, work, and live. However, this…

Explore MITRE ATT&CK Techniques in Real-World Samples With ANY.RUN TI Lookup Tool
25
Nov
2024

Explore MITRE ATT&CK Techniques With ANY.RUN TI Lookup Tool

In a major update aimed at revolutionizing the way cybersecurity professionals tackle threats, ANY.RUN has unveiled its redesigned Threat Intelligence…