Category: CyberSecurityNews

Multiple Flaws Impacting Boot Chain Of Samsung Devices
16
Oct
2024

Multiple Flaws Impacting Boot Chain Of Samsung Devices

The Android boot chain initiates with the “Boot ROM,” which initializes the “bootloader.” The bootloader then loads the kernel, which is…

Linux System ‘noexec’ Mount Flag Bypass Allows Malicious Code Execution
16
Oct
2024

Linux System ‘noexec’ Mount Flag Bypass Allows Malicious Code Execution

A recent discovery in the Linux ecosystem has unveiled a method to bypass the ‘noexec’ mount flag, enabling malicious code…

Critical Oracle Security Update, 334 Vulnerabilities Patched
16
Oct
2024

Critical Oracle Security Update, 334 Vulnerabilities Patched

Oracle has released its October 2024 Critical Patch Update (CPU), addressing a staggering 334 security vulnerabilities across its vast product…

Kubernetes Image Builder Vulnerabilities
16
Oct
2024

Kubernetes Image Builder Flaw Let Attackers Gain Root Access to VMs

The Kubernetes Security Response Committee has disclosed two critical vulnerabilities in the Kubernetes Image Builder that could allow attackers to…

90+ 0-Days, 40+ N-Days Exploited In The Wild
16
Oct
2024

90+ 0-Days, 40+ N-Days Exploited In The Wild

Hackers exploit security vulnerabilities in the wild primarily to gain ‘unauthorized access to systems,’ ‘steal sensitive data,’ and ‘disrupt services.’…

Authorities Takendown Sipulitie Dark Web Marketplace
16
Oct
2024

Authorities Takendown Sipulitie Dark Web Marketplace

Finnish Customs, in collaboration with the Swedish Police, has successfully shut down the Sipulitie dark web marketplace. This site, operating…

CISA Warns of Three Vulnerabilities Actively Exploited in the Wild
16
Oct
2024

CISA Warns of Three Vulnerabilities Actively Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding three critical vulnerabilities currently exploited in the…

Microsoft Dataverse Authentication Flaw
16
Oct
2024

Microsoft Dataverse Authentication Flaw Let Attackers Escalate Privileges

A critical security vulnerability in Microsoft Dataverse has been discovered, allowing authorized attackers to elevate their privileges over a network….

Chrome 130 Released with Fix for 17 Security Flaws
16
Oct
2024

Chrome 130 Released with Fix for 17 Security Flaws

Google has released Chrome 130, addressing 17 security vulnerabilities in the popular web browser. This latest update, version 130.0.6723.58/.59 for…

What is Business Continuity Plan? How it Works!
16
Oct
2024

What is Business Continuity Plan? How it Works!

Businesses face an array of potential disruptions that can threaten their operations. From natural disasters to cyberattacks, maintaining business functions…

New Post-Exploitation Toolkit!
15
Oct
2024

SideWinder APT Hackers Added New Post-Exploitation Toolkit to Their Arsenal

Security researchers at Kaspersky have uncovered a significant expansion in the capabilities of the SideWinder advanced persistent threat (APT) group….

Hackers Using Bitbucket Code Hosting Platform To Host Malicious Payloads
15
Oct
2024

Hackers Using Bitbucket Code Hosting Platform To Host Malicious Payloads

Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting Bitbucket, a popular code hosting platform, to deliver dangerous payloads to…