Category: CyberSecurityNews

Hackers Abuse DocuSign API to Send Genuine Looking Invoices
07
Nov
2024

Hackers Abuse DocuSign API to Send Genuine Looking Invoices

Cybercriminals have started leveraging DocuSign’s API to send fraudulent invoices that appear shockingly authentic. Unlike traditional phishing schemes that rely…

North Korean Hackers Employing New Tactic To Acquire Remote Jobs
07
Nov
2024

North Korean Hackers Employing New Tactic To Acquire Remote Jobs

Hackers increasingly target remote workers by exploiting vulnerabilities arising from the shift to telecommuting. They use tactics like “voice phishing”…

How to Price MDR Services for Your Business: A Practical Guide
06
Nov
2024

How to Price MDR Services for Your Business: A Practical Guide

When thinking about Managed Detection and Response (MDR) services, the question often comes up: How much is this going to…

Azure API Management Flaws Let Attackers Take Full Control APIM Service
06
Nov
2024

Azure API Management Flaws Let Attackers Take Full Control APIM Service

Security researchers at Binary Security have uncovered critical vulnerabilities in Microsoft’s Azure API Management (APIM) service that could allow attackers…

LameDuck's Skynet Botnet Launched 35,000+ DDoS Attacks
06
Nov
2024

LameDuck’s Skynet Botnet Launched 35,000+ DDoS Attacks

A DDoS attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, and network with…

HookBot Malware's Overlay Attacks To Impersonate As Popular Brands
06
Nov
2024

HookBot Malware’s Overlay Attacks To Impersonate As Popular Brands

Overlay attacks involve placing a tricky layer over legitimate applications on mobile devices like Android. This malicious overlay can mimic…

CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux VMs
06
Nov
2024

CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux VMs

Weaponized Linux virtual machines are used for offensive cybersecurity purposes like “penetration testing” or “exploiting vulnerabilities.” These setups often use…

Hacker Behind Snowflake Data Breach Arrested in Canada
06
Nov
2024

Hacker Behind Snowflake Data Breach Arrested in Canada

A man suspected of being the hacker responsible for this year’s wave of data breaches involving Snowflake, a popular cloud-based…

INTERPOL Takes Down 22,000 malicious IP addresses Used for Hacking
06
Nov
2024

INTERPOL Takes Down 22,000 malicious IP addresses Used for Hacking

INTERPOL has dismantled over 22,000 malicious IP addresses and servers linked to various cyber threats. This operation, code-named Synergia II, ran…

Chrome Security Update Vulnerabilities
06
Nov
2024

Patch for Multiple High Severity Vulnerabilities

In a critical update to enhance user security, Google has rolled out an emergency patch for its widely-used Chrome browser,…

ClickFix Leveraging GMeet And Zoom Pages To Deliver Infostealer Malware
05
Nov
2024

ClickFix Leveraging GMeet And Zoom Pages To Deliver Infostealer Malware

A sophisticated social engineering tactic dubbed “ClickFix” has emerged as a significant cybersecurity threat, exploiting fake Google Meet and Zoom…

APT36 Group Attacking Windows Systems Absuing Google Drive & Slack
05
Nov
2024

APT36 Group Attacking Windows Systems Absuing Google Drive & Slack

ElizaRAT is a type of malware that primarily targets Windows systems and functions as a RAT. It enables threat actors…