Category: CyberSecurityNews

Meta Hit with $101 Million Fine
27
Sep
2024

Meta Hit with $101 Million Fine for Storing Passwords in Plain Text

Meta has been slapped with a €91 million ($101 million) fine by the Irish Data Protection Commission (DPC) for storing…

Microsoft Audio Bus Vulnerability Let Attackers Execute Remote Code
27
Sep
2024

Microsoft Audio Bus Vulnerability Let Attackers Execute Remote Code

Cisco Talos’ Vulnerability Research team revealed two significant vulnerabilities in Microsoft products that have been patched by the company over…

NIST Recommends New Rules for Password Security
27
Sep
2024

NIST Recommends New Rules for Password Security

The National Institute of Standards and Technology (NIST) has released updated guidelines for password security, marking a significant shift from…

Top 5 SME Cybersecurity Mistakes & Solutions in 2024
27
Sep
2024

Top 5 SME Cybersecurity Mistakes & Solutions in 2024

Many small to medium-sized enterprises (SMEs) misperceive cybersecurity as an IT issue for technical specialists. By recognizing organizational protection as…

Hackers Break Into OpenAI Newsroom X Account For Crypto Scam
27
Sep
2024

Hackers Break Into OpenAI Newsroom X Account For Crypto Scam

Hackers compromised OpenAI’s official press account on X, a platform used for product and policy announcements. The attackers posted a…

What is Authentication? – Types, Role & How it Works!
27
Sep
2024

What is Authentication?Types, Roles & How it Works!

Authentication is a cornerstone of digital security, serving as the first defense against unauthorized access to sensitive information and systems….

G2 Names INE 2024 Enterprise and Small Business Leader
27
Sep
2024

G2 Names INE 2024 Enterprise and Small Business Leader

INE, a global leader in networking and cybersecurity training and certifications, is proud to announce they have earned 14 awards…

SilentSelfie Exploited 25 Websites To Deploy Malicious Android Application
27
Sep
2024

SilentSelfie Exploited 25 Websites To Deploy Malicious Android Application

Threat actors are increasingly exploiting websites to carry out various cyberattacks, and they do so by leveraging vulnerabilities in web…

Hackers Abuse HTML Smuggling To Deliver Phishing Attack
27
Sep
2024

Hackers Abuse HTML Smuggling To Deliver Phishing Attack

HTML smuggling is a sophisticated technique used by threat actors to deliver malware by embedding malicious JavaScript within seemingly harmless…

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution
27
Sep
2024

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

LummaC2 Stealer is a sophisticated information-stealing malware designed to target sensitive data, particularly from cryptocurrency wallets and 2FA extensions across…

Storm-0501 Ransomware Group Attacking Hybrid Cloud Environments
27
Sep
2024

Storm-0501 Ransomware Group Attacking Hybrid Cloud Environments

Ransomware groups are organized cybercriminal entities that deploy malicious software to encrypt victims’ data, demanding ransom payments for decryption keys….

Critical WhatsUp Gold Vulnerabilities, let Attackers Gain unauthorized Network access
27
Sep
2024

Critical WhatsUp Gold Vulnerabilities, let Attackers Gain unauthorized Network access

WhatsUp Gold, a widely used network monitoring software, recently identified six critical vulnerabilities that could allow attackers to access unauthorized…