Category: CyberSecurityNews

Cisco ASA & FTD VPNs Vulnerability
24
Oct
2024

Cisco ASA & FTD VPNs Vulnerability Actively Exploited in Attacks

Cisco has disclosed a critical vulnerability in its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software that is…

Chrome Security Update, Patch for High Severity Vulnerability
24
Oct
2024

Chrome Security Update, Patch for High Severity Vulnerability

Google has released a critical security update for its Chrome browser, addressing three high-severity vulnerabilities that could compromise user security….

FortiManager Zero-Day Vulnerability
24
Oct
2024

Critical Zero-Day Vulnerability in FortiManager Exploited in the Wild

Fortinet has publicly disclosed a critical zero-day vulnerability in its FortiManager software, identified as CVE-2024-47575. The vulnerability has been actively…

Hardcoded Creds In Popular Apps Put Millions Of Android & iOS Users At Risk
23
Oct
2024

Hardcoded Creds In Popular Apps Put Millions Of Android & iOS Users At Risk

Hardcoded credentials are often found in source code and refer to the practice of embedding “plain text passwords” and other…

Lazarus APT Hackers Exploit Chrome Zero-Day via Cryptocurrency Game
23
Oct
2024

Lazarus APT Hackers Exploit Chrome Zero-Day via Cryptocurrency Game

The notorious Lazarus Advanced Persistent Threat (APT) group has exploited a zero-day vulnerability in the Google Chrome browser, using a…

Xerox Printers Vulnerability Let Attackers Remotely Takeover Devices
23
Oct
2024

Xerox Printers Vulnerability Let Attackers Remotely Takeover Devices

Multiple Xerox printer models have been found to have a severe security vulnerability, which allows attackers with administrative access to…

SMB Force-Authentication Vulnerability Impacts All OPA Versions For Windows
23
Oct
2024

SMB Force-Authentication Vulnerability Impacts All OPA Versions For Windows

Open Policy Agent (OPA) is an open-source policy engine designed to unify policy enforcement across cloud-native environments. It allows organizations…

SIEM Automation Explained: How it Works?
23
Oct
2024

SIEM Automation Explained: How it Works?

SIEM (Security Information and Event Management) is like the nervous system of your security operations. It collects all the threat…

Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems
23
Oct
2024

Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems

A serious security vulnerability has been discovered in Red Hat’s NetworkManager-libreswan plugin that could allow local attackers to escalate privileges…

Meta To Use Facial Recognition To Help Gaining Access To Compromised Accounts
23
Oct
2024

Meta To Use Facial Recognition To Help Gaining Access To Compromised Accounts

Meta, the parent company of Facebook and Instagram, has announced a new initiative to improve account security and combat fraud…

New Anti-Bot Services Bypassing Google’s Protective ‘Red Page’ Warnings
23
Oct
2024

New Anti-Bot Services Bypassing Google’s Protective ‘Red Page’ Warnings

Novel anti-bot services are surfacing on the dark web, offering cybercriminals sophisticated tools to bypass Google’s protective ‘Red Page’ warnings….

Samsung Use-After-Free Zero-day Vulnerability Exploited In The Wild
23
Oct
2024

Samsung Use-After-Free Zero-day Vulnerability Exploited In The Wild

Samsung has disclosed a critical security vulnerability (CVE-2024-44068) affecting multiple Exynos mobile processors actively exploited in the wild. The high-severity…