Category: CyberSecurityNews

Hackers Exploiting Docker Swarm, Kubernetes And SSH Servers In Large Scale
01
Oct
2024

Hackers Exploiting Docker Swarm, Kubernetes & SSH Servers In Large Scale

Docker Swarm and Kubernetes are both container orchestration tools, but they serve different use cases.SSH servers can be utilized alongside…

What is Autonomous System? Types, Roles & ASN Definition
01
Oct
2024

What is Autonomous System? Types, Roles & ASN Definition

The Internet, a vast and intricate network of networks, relies on numerous underlying technologies and protocols to function seamlessly. The…

Hackers Exploiting Critical SolarWinds Serv-U Vulnerability In The Wild
01
Oct
2024

Hackers Exploiting Critical SolarWinds Serv-U Vulnerability In The Wild

SolarWinds is a prominent software company specializing in IT management and monitoring solutions for networks and infrastructure. The company gained…

Vesta Admin Panel Vulnerability Allows Complete Linux Server Takeover
01
Oct
2024

Vesta Admin Panel Vulnerability Allows Complete Linux Server Takeover

A vulnerability in the Vesta Control Panel has been discovered that allows attackers to take over entire Linux servers. This…

Microsoft Defender Adds protection to Detect unsecured Wi-Fi connections Automatically
01
Oct
2024

Microsoft Defender Adds protection to Detect unsecured Wi-Fi connections

Microsoft has announced a significant update to its Defender software, aiming to improve online safety by automatically detecting unsecured Wi-Fi…

Google Workspace New Password Policies
01
Oct
2024

Google Workspace Implements New Password Policies to Enhance Security

Google has announced significant changes to its password policies for Google Workspace, aimed at improving user security and protecting against…

U.K. Citizen Charged for Hacking into Computer Systems of U.S. Companies
01
Oct
2024

U.K. Citizen Charged for Hacking into Computer Systems of U.S. Companies

The Securities and Exchange Commission (SEC) announced charges against Robert B. Westbrook, a U.K. citizen, for allegedly hacking into the…

New Sophisticated Linux Malware Exploiting Apache2 Web Servers
01
Oct
2024

New Sophisticated Linux Malware Exploiting Apache2 Web Servers

Exploiting Apache2 web servers often involves targeting vulnerabilities such as remote code execution (RCE) and path traversal flaws. Since Apache…

Western Digital My Cloud Devices Flaw Let Attackers Execute Arbitrary Code
01
Oct
2024

Western Digital My Cloud Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability in Western Digital’s My Cloud devices has been identified. An unchecked buffer in the Dynamic DNS client…

Microsoft Recall New Security Features
30
Sep
2024

Microsoft Updates Recall Security Architecture Amid Controversy

In a move to address growing concerns over privacy and security, Microsoft has unveiled significant updates to the security architecture…

Nitrogen Malware As IP Scanner Deploying Sliver & Cobalt Strike
30
Sep
2024

Nitrogen Malware As IP Scanner Deploying Sliver & Cobalt Strike

Silver and Cobalt Strike are sophisticated adversary simulation tools that are widely used in penetration testing and red team operations….

BBTok Attacking Organizations Using PowerShell, Python, And dnlib
30
Sep
2024

BBTok Attacking Organizations Using PowerShell, Python, And dnlib

BBTok is a banking malware first identified in 2020 and it primarily targets users in Latin America (particularly Mexico and…