Category: CyberSecurityNews

Cisco Investigating Cyber Security Incident
19
Oct
2024

Cisco Investigating Cyber Security Incident, Takes DevHub Portal Offline

Cisco, has launched an investigation into a potential cyber security incident and has taken its public DevHub portal offline as…

18
Oct
2024

Bitdefender Total Security Vulnerability Exposes Users to Man-in-the-Middle Attacks

Bitdefender Total Security has been found vulnerable to Man-in-the-Middle (MITM) attacks due to improper certificate validation in its HTTPS scanning…

Vulnerabilities In WebRTC Implementations Let Attackers Trigger DoS Attacks
18
Oct
2024

Vulnerabilities In WebRTC Implementations Let Attackers Trigger DoS Attacks

WebRTC (Web Real-Time Communication) is an open-source project that facilitates real-time audio, video, and data sharing directly between web browsers…

SolarWinds Web Help Desk Vulnerability Exposes Systems To Remote Code Execution
18
Oct
2024

Critical SolarWinds Web Help Desk Vulnerability Exposes Systems To Remote Attack

A critical vulnerability has been identified in SolarWinds Web Help Desk, potentially allowing attackers to execute remote code on affected…

Cisco ATA 190 Telephone Adapter Flaw Exposes Devices To Remote Takeover
18
Oct
2024

Cisco ATA 190 Adapter Vulnerabilities Expose Devices To Remote Attacks

Cisco has issued a critical security advisory concerning multiple vulnerabilities in its ATA 190 Series Analog Telephone Adapters. These vulnerabilities…

PoC Exploit BIG-IP Privilege Escalation
18
Oct
2024

PoC Exploit Released for BIG-IP Privilege Escalation Vulnerability

A critical vulnerability in F5 BIG-IP, a popular network traffic management and security solution tracked as CVE-2024-45844, allows authenticated attackers…

New macOS Vulnerability Allows Attackers to Bypass Security Controls
18
Oct
2024

New macOS Vulnerability Allows Attackers to Bypass Security Controls

A recently discovered vulnerability in macOS, dubbed “HM Surf,” allows attackers to bypass the operating system’s Transparency, Consent, and Control (TCC) technology, gaining unauthorized access to a user’s protected…

SAP NetWeaver Code Injection Vulnerability
17
Oct
2024

SAP NetWeaver Code Injection Vulnerability Let Attackers Upload Malicious Files

A critical security flaw in SAP NetWeaver AS Java has been uncovered, potentially allowing attackers to upload malicious files and…

A Recent Fake CAPTCHA Attack
17
Oct
2024

A Recent Fake CAPTCHA Attack

Lumma Stealer, also known as LummaC2, is a widely known malware that first surfaced in 2022. Since then, it has…

Hacking Laptop BBQ Lighter
17
Oct
2024

Hacking Laptop With a BBQ Lighter to Gain Root Access

A simple BBQ lighter has been used to exploit vulnerabilities in laptops, gaining root access through an innovative method known…

macOS Gatekeeper Security Feature Bypassed to Execute Malicious Code
17
Oct
2024

macOS Gatekeeper Security Feature Bypassed to Execute Malicious Code

Security researchers at Palo Alto Networks’ Unit 42 have uncovered significant vulnerabilities in macOS’s Gatekeeper security mechanism. This discovery reveals…

Authorities take down Gang Behind ATM Attacks
17
Oct
2024

Authorities take down Gang Behind ATM Attacks

Dutch, French, and German police forces arrested three members of a notorious criminal network responsible for a series of violent…