Category: CyberSecurityNews

Top 6 Malware Persistence Mechanisms Used by Hackers: A Detailed Guide
21
Nov
2024

Top 6 Malware Persistence Mechanisms Used by Hackers: A Detailed Guide

Persistence mechanisms play a critical role in modern cyberattacks, helping malware remain active on compromised systems even after reboots, log-offs,…

Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay
21
Nov
2024

Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay

Threat actors are actively using a new cash-out technique called “Ghost Tap” to cash out money using credit card information…

Decade-Old Flaws In Ubuntu Server Package Let Attackers Gain Root Access
21
Nov
2024

Decade-Old Flaws In Ubuntu Server Package Let Attackers Gain Root Access

Multiple decade-old Local Privilege Escalation (LPE) vulnerabilities discovered within the needrestart component installed by default in Ubuntu Server might allow…

Gelsemium APT Hackers Attacking Linux Servers With New WolfsBane Malware
21
Nov
2024

Gelsemium APT Hackers Attacking Linux Servers With New WolfsBane Malware

A new Linux backdoor named WolfsBane has been recently uncovered by the ESET researchers, attributed to the Gelsemium advanced persistent…

10-Year Old Flaws In Ubuntu Server needrestart Package Let Attackers Gain Root Access
21
Nov
2024

10-Year Old Flaws In Ubuntu Server needrestart Package Let Attackers Gain Root Access

The cybersecurity community is on high alert following the discovery of five critical Local Privilege Escalation (LPE) vulnerabilities in the…

CISA Warns of VMware VCenter Vulnerabilities Actively Exploited in Attacks
21
Nov
2024

CISA Warns of VMware VCenter Vulnerabilities Actively Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding two newly discovered vulnerabilities in VMware’s vCenter…

Authorities Charged 5 Hackers For Attacking Companies via Phishing Text Messages
21
Nov
2024

Authorities Charged 5 Hackers For Attacking Companies via Phishing Text Messages

Federal authorities have unveiled criminal charges against 5 individuals accused of directing a sophisticated phishing scheme targeting employees of companies…

Malicious PyPi Package Mimic ChatGPT & Claude Steals Developers Data
21
Nov
2024

Malicious PyPi Package Mimic ChatGPT & Claude Steals Developers Data

Kaspersky’s Global Research and Analysis Team (GReAT) has recently uncovered a sophisticated supply chain attack targeting the Python Package Index…

Critical Kubernetes Vulnerability Let Attackers Execute Arbitrary Commands
21
Nov
2024

Critical Kubernetes Vulnerability Let Attackers Execute Arbitrary Commands

A high-severity security vulnerability in Kubernetes has been discovered, potentially allowing attackers to execute arbitrary commands beyond container boundaries. The…

macOS WorkflowKit Race Vulnerability Let Malicious Apps Intercept Shortcuts
21
Nov
2024

macOS WorkflowKit Race Vulnerability Let Malicious Apps Intercept Shortcuts

A critical vulnerability in macOS WorkflowKit, the framework underpinning Apple’s Shortcuts app, has been disclosed. This vulnerability allows malicious applications…

DDoS Attack Growing Bigger & Dangerous, New Report Reveals
21
Nov
2024

DDoS Attack Growing Bigger & Dangerous, New Report Reveals

Distributed Denial of Service (DDoS) attacks are escalating at an alarming rate, as unveiled in a revelation by Cloudflare researchers…

MITRE Lists 25 Most Dangerous Software Weaknesses of 2024
21
Nov
2024

MITRE Lists 25 Most Dangerous Software Weaknesses of 2024

MITRE has released its annual list of the top 25 most dangerous software weaknesses for 2024, highlighting critical vulnerabilities that…