Category: CyberSecurityNews

SysBumps
03
Jan
2025

New Kernel Break Attack Bypassing macOS Systems Security

Security researchers have uncovered a novel attack targeting macOS systems running on Apple Silicon processors. Dubbed “SysBumps,” this attack exploits…

HIPAA Security Rule
03
Jan
2025

New HIPAA Security Rule Released to Strengthen Healthcare Data

The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) has unveiled a Notice…

Cyber Threats of 2024
02
Jan
2025

Top Sophisticated Cyber Security Threats of 2024

As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the…

Three Russian Nationals Charged for Espionage & Sabotage Activities
02
Jan
2025

Three Russian Nationals Charged for Espionage & Sabotage Activities

German authorities have charged three Russian-German nationals with espionage and sabotage activities aimed at undermining Germany’s military support for Ukraine….

Nitrogen Ransomware Attacks Organizations, Encrypts Files With .NBA Extension
02
Jan
2025

Nitrogen Ransomware Attacks Organizations, Encrypts Files With .NBA Extension

A new ransomware strain, dubbed Nitrogen, has emerged as a significant threat over the past four months, targeting organizations across…

Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys
02
Jan
2025

Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys

Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs)…

Top 10 Most Common Cyber Attacks of 2024
02
Jan
2025

Top 10 Most Common Cyber Attacks of 2024

The year 2024 marked a pivotal moment in the ever-evolving realm of cybersecurity as cyberattacks became more frequent, sophisticated, and…

EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials
02
Jan
2025

EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials

A sophisticated hacker group dubbed “EC2 Grouper” has been exploiting AWS tools and compromised credentials to launch attacks on cloud…

Angular Expressions Vulnerability
02
Jan
2025

Angular Expressions Vulnerability Let Attackers Gain Full System Access

A critical security vulnerability in Angular Expressions, a standalone module for the Angular.JS web framework, has been discovered, potentially allowing…

PoC Exploit Released for Critical Windows LDAP RCE Vulnerability
02
Jan
2025

PoC Exploit Released for Critical Windows LDAP RCE Vulnerability

SafeBreach Labs’ researchers unveiled a proof-of-concept (PoC) exploit for a critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), tracked…

Memory-Based Attacks
01
Jan
2025

How Fileless Malware Operates Without Leaving A Trace

Threat actors are always developing new and more effective approaches to system breaches in the perpetually shifting field of cybersecurity….

DoubleClickjacking
01
Jan
2025

“Double-Click” Attack to Hack Websites & Take over Accounts

In a concerning development for internet security, a new variation of a long-standing cyberattack technique known as “DoubleClickjacking,” has been…