Category: CyberSecurityNews

What is Broadcast? Types, Examples & How it Works!
15
Oct
2024

What is Broadcast? Types, Examples & How it Works!

Broadcasting, in the context of computer networks, refers to a method of communication where a message is sent from one…

Netgear WiFi Extender Vulnerability Let Attackers Inject Malicious Commands
15
Oct
2024

Netgear WiFi Extender Vulnerability Let Attackers Inject Malicious Commands

Security researchers have uncovered critical vulnerabilities in several popular Netgear WiFi extender models that could allow attackers to execute malicious…

Next.js Image Optimization Vulnerability
15
Oct
2024

Next.js Image Optimization Vulnerability Let Attackers Exhaust CPU Resources

A critical security vulnerability has been discovered in the popular React framework Next.js, potentially allowing attackers to exhaust CPU resources…

Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Remote Code
15
Oct
2024

Splunk Enterprise Vulnerabilities Let Attackers Execute Remote Code

Splunk has released patches for several high-severity vulnerabilities in its Enterprise product that could allow attackers to execute remote code…

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns & PINs
14
Oct
2024

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns & PINs

TrickMo is a sophisticated malware that emerged as a “banking Trojan”, and this malware is designed to steal “financial credentials”…

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details
14
Oct
2024

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

OilRig hackers (aka Earth Simnavaz, APT34, OilRig) is a cyber espionage group that was linked to “Iranian” interests. This APT…

Supply Chain Attack Leveraging Entry Points
14
Oct
2024

Supply Chain Attack Leveraging Entry Points in PyPI, npm, Ruby Gems & NuGet

A sophisticated supply chain attack has been identified, leveraging entry points in popular open-source package repositories, including PyPI (Python), npm…

CoreWarrior Malware Attacking Windows Machines With Self-replication Capabilities
14
Oct
2024

CoreWarrior Malware Attacking Windows Machines With Self-replication Capabilities

Malware targeting Windows machines continues to be a significant threat. While these threats could be in various forms like viruses,…

pac4j Vulnerable To RCE Attacks
14
Oct
2024

Popular Java Framework pac4j Vulnerable To RCE Attacks

A critical security vulnerability has been identified in the popular Java security framework, pac4j, specifically affecting versions prior to 4.0….

North Korean Posing as Recruiters to Attack Job Seekers Device
14
Oct
2024

North Korean Posing as Recruiters to Attack Job Seekers Device

Hackers target job seekers primarily for financial gain and to obtain sensitive personal information.  Many job seekers are vulnerable due…

Gmail Users Beware Of AI Scam that Takeovers Your Gmail Account
14
Oct
2024

Gmail Users Beware Of AI Scam Calls that Takeovers Your Gmail Account

A sophisticated new scam targeting Gmail users has emerged, using artificial intelligence to trick victims into surrendering control of their…

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication
14
Oct
2024

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

2FA enhances security by requiring two distinct forms of identification before granting access to an account or service. Though 2FA…