Category: CyberSecurityNews

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management
08
Oct
2024

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management

Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined user experience. Badge Inc., the award-winning…

What is Bastion Host? Types, Architecture & Use Cases
08
Oct
2024

What is Bastion Host? Types, Architecture & Use Cases

A bastion host is a critical line of defense, acting as a fortified gateway between an internal network and external…

Vulnerability Scanner Released For CUPS Printing System Flaws
08
Oct
2024

Vulnerability Scanner Released For CUPS Printing System Flaws

A critical set of vulnerabilities in the Common Unix Printing System (CUPS) has been disclosed, allowing remote attackers to execute…

Ukrainian Hackers Attack Russian Media Following Putin’s Birthday
08
Oct
2024

Ukrainian Hackers Attack Russian Media Following Putin’s Birthday

Ukrainian hackers launched a large-scale attack on Russian state media company VGTRK on October 7, coinciding with President Vladimir Putin’s…

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windows Servers
08
Oct
2024

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windows Servers

LemonDuck malware has evolved from a cryptocurrency mining botnet into a “versatile malware” that is capable of “stealing credentials,” “disabling…

North Korean APT Hackers Exploiting DMARC Misconfigs For Phishing Attacks
08
Oct
2024

North Korean APT Hackers Exploiting DMARC Misconfigs For Phishing Attacks

DMARC is an email authentication protocol that helps domain owners protect against unauthorized use like “email spoofing” and “phishing attacks.”…

Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls
08
Oct
2024

Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls

DNS tunneling is a hacking technique that hides information by taking advantage of the DNS protocol. This attack enables threat…

Your Smart TVs Tracking Your Viewing Habits Using ACR technology
08
Oct
2024

Your Smart TVs Tracking Your Viewing Habits Using ACR technology

A recent study has shed light on the extensive use of Automatic Content Recognition (ACR) technology by smart TVs to…

iTunes 0-day Privilege Escalation Flaw Let Attackers Hack Windows
08
Oct
2024

iTunes 0-day Privilege Escalation Flaw Let Attackers Hack Windows

iTunes is a media player which is developed by Apple Inc. and this application enables users to purchase, organize, and…

Casio Suffers Major Cyber Attack
08
Oct
2024

Unauthorized Access to Network Confirmed

Casio Computer Co., Ltd., a renowned Japanese electronics manufacturer, has confirmed a significant cybersecurity breach that occurred on October 5,…

American Water Works IT Systems Hit by Cyber Attack
08
Oct
2024

American Water Works IT Systems Hit by Cyber Attack

American Water Works Company, Inc., the largest regulated water and wastewater utility in the United States, reported a cybersecurity incident…

MoneyGram Cyber Attack: Hackers Stole Customers’ Personal and Transaction Data
08
Oct
2024

Hackers Stole Customers’ Personal and Transaction Data

MoneyGram Payment Systems, Inc. confirmed that hackers accessed and stole sensitive customer data, including personal information and transaction details. The…