Category: CyberSecurityNews

Researchers Warn of AI Image Generators Potentially Leaking Sensitive Instructions
14
Nov
2024

Researchers Warn of AI Image Generators Potentially Leaking Sensitive Instructions

Researchers have recently uncovered a potential security flaw in advanced AI image generators, particularly in the case of Recraft, an…

Google To Issue CVEs For Critical Google Cloud Vulnerabilities
14
Nov
2024

Google To Issue CVEs For Critical Google Cloud Vulnerabilities

Google Cloud has announced a significant expansion of its security transparency efforts by committing to assign Common Vulnerabilities and Exposures…

Chinese National Pleads Guilty for Laundering Millions in Crypto Investments
14
Nov
2024

Chinese National Pleads Guilty for Laundering Millions in Crypto Investments

A 41-year-old dual citizen of China and St. Kitts and Nevis, Daren Li has pleaded guilty to conspiracy to commit…

Bitdefender Releases ShrinkLocker Ransomware Decryptor That Recovers BitLocker Files
14
Nov
2024

Bitdefender Releases ShrinkLocker Ransomware Decryptor That Recovers BitLocker Files

A decryption tool for ShrinkLocker has been recently unveiled by Bitdefender. While it’s an unusual ransomware strain which was discovered…

Single Right-Click Let Hackers Gain Access To System By Exploiting 0-Day
14
Nov
2024

Single Right-Click Let Hackers Gain Access To System By Exploiting 0-Day

A newly discovered 0-day vulnerability in Windows systems, CVE-2024-43451, has been actively exploited by suspected Russian hackers to target Ukrainian…

Chinese Hackers Compromised US Govt Officials' Private Communications
14
Nov
2024

Chinese Hackers Compromised US Govt Officials’ Private Communications

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have jointly announced the discovery of…

How to Improve AWS Cyber Resilience: Actionable Guide for Businesses
13
Nov
2024

How to Improve AWS Cyber Resilience: Actionable Guide for Businesses

Let’s be honest—nobody likes thinking about worst-case scenarios. But in today’s digital terrain, cyberattacks are less of an “if” and…

APT Hackers Leverage macOS Flutter Apps To Embed Malicious Codes on Devices
13
Nov
2024

APT Hackers Leverage macOS Flutter Apps To Embed Malicious Codes on Devices

A sophisticated malware campaign targeting macOS devices, believed to be orchestrated by North Korean state-sponsored or APT hackers. The malicious…

Hackers Attacking GitHub Users With a New Sophisticated Tool
13
Nov
2024

Hackers Attacking GitHub Users With a New Sophisticated Tool

GoIssue is a new sophisticated phishing tool targeting GitHub users. It poses a significant threat to developers and organizations worldwide….

Fortinet Patches Critical Flaws That Let Hackers Take Control of The System
13
Nov
2024

Fortinet Patches Critical Flaws That Let Hackers Take Control of The System

Fortinet has released critical security updates to address multiple product vulnerabilities, including FortiOS, FortiAnalyzer, FortiManager, and FortiClient Windows. If left…

China-Nexus Hackers Hijack Websites to Deliver Cobalt Strike Malware
13
Nov
2024

China-Nexus Hackers Hijack Websites to Deliver Cobalt Strike Malware

Chinese state-sponsored hackers recently compromised two prominent Tibetan websites in a sophisticated cyber-espionage campaign to distribute the notorious Cobalt Strike…

Zoom App Vulnerability Let Attackers Execute Remote Code
13
Nov
2024

Zoom App Vulnerability Let Attackers Execute Remote Code

Zoom recently disclosed multiple vulnerabilities affecting its suite of applications, including a critical flaw that could allow attackers to execute…