Category: CyberSecurityNews

Comcast Data Breach: 237,000+ Customers’ Personal Data Exposed
08
Oct
2024

237,000+ Customers’ Personal Data Exposed

A data breach has impacted more than 237,000 Comcast customers, exposing their personal information such as names, addresses, Social Security…

Google to Block Malicious Sideloaded Apps
07
Oct
2024

Google to Block Malicious Sideloaded Apps Exclusively for Indian Users

Google has announced the launch of an enhanced fraud protection pilot for Android users in the country. This initiative aims…

North Korean Hackers Employ PowerShell-Based Malware With Serious Evasion Techniques
07
Oct
2024

Hackers Employ PowerShell-Based Malware With Serious Evasion Techniques

PowerShell-based malware is a form of fileless malware that exploits PowerShell to execute malicious scripts directly in memory which helps…

Critical Oath-Toolkit Vulnerability Let Attackers Escalate Privilege
07
Oct
2024

Critical Oath-Toolkit Vulnerability Let Attackers Escalate Privilege

OATH Toolkit is a software suite that is primarily designed to implement OTP authentication systems. It includes libraries and command-line…

Hackers Exploit Visual Studio RCE Vulnerability Via Dump Files
07
Oct
2024

Hackers Exploit Visual Studio RCE Vulnerability Via Dump Files

Visual Studio is a powerful IDE from Microsoft that is primarily used for developing applications in various programming languages like…

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection
07
Oct
2024

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has partnered with Hybrid Analysis, a…

What is Banner Grabbing? Types, Features & How it Works!
07
Oct
2024

What is Banner Grabbing? Types, Features & How it Works!

Both hackers and security professionals employ various techniques to gather information about computer systems and networks. One such technique is…

Akesh Damaraju’s Cloud Security Masterclass: Combatting Tomorrow’s Cyber Threats
07
Oct
2024

Akesh Damaraju’s Cloud Security Masterclass: Combatting Tomorrow’s Cyber Threats

Akesh Damaraju’s new book, “Next-Gen Cloud Security: Pioneering Approaches for Modern Threats,” is a revolutionary guide to cloud security in…

50+ Vulnerabilities Uncovered in RPKI security Framework
07
Oct
2024

50+ Vulnerabilities Uncovered in RPKI security Framework

RPKI is a security framework designed to enhance the integrity of Internet routing by associating specific IP address blocks and…

Crypto Hacker Pleads Guilty for Stealing Over  Million in Cryptocurrency
07
Oct
2024

Crypto Hacker Pleads Guilty for Stealing $37M in Cryptocurrency

Evan Frederick Light, a 21-year-old from Lebanon, Indiana, has pleaded guilty to conspiracy charges to Commit Wire Fraud and to…

Chinese Threat Group Hacked Major US Telecom Companies Network
07
Oct
2024

Chinese Threat Group Hacked Major US Telecom Companies

According to U.S. officials, a Chinese hacker group known as “Salt Typhoon” has infiltrated the networks of at least three…

Malicious PyPI Packages Mimics a Legitimate Tools
07
Oct
2024

Malicious PyPI Packages Mimics a Legitimate Tools

Threat actors target the “PyPI” primarily due to its vast user base and the ease of distributing malicious packages within…