Category: CyberSecurityNews

Google Warns of North Korean IT Workers Have Infiltrated the U.S. Workforce
24
Sep
2024

Google Warns of North Korean IT Workers Have Infiltrated the U.S. Workforce

Nowadays, organizations face increasing cybersecurity threats that can lead to significant financial and reputational damage. Cybersecurity involves implementing and executing…

Apache Tomcat vulnerability lets Attackers trigger Dos Attack
24
Sep
2024

Apache Tomcat vulnerability lets Attackers trigger Dos Attack

A newly discovered vulnerability in Apache Tomcat, identified as CVE-2024-38286, has raised significant concerns among cybersecurity experts. This flaw allows…

Chinese Hackers Exploiting GeoServer Vulnerability To Deploy EAGLEDOOR Malware
24
Sep
2024

Chinese Hackers Exploiting GeoServer Vulnerability To Deploy EAGLEDOOR Malware

GeoServer is an open-source server written in Java that enables users to share, process, and edit geospatial data. It supports…

Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems
24
Sep
2024

Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems

A critical unauthenticated Remote Code Execution (RCE) vulnerability has been discovered, impacting all GNU/Linux systems. As per agreements with developers,…

TI-84 Calculator ChatGPT
24
Sep
2024

Secret Hack Connects TI-84 Calculator to Internet & Accesses ChatGPT

A YouTube creator known as “ChromaLock” has successfully modified a Texas Instruments TI-84 graphing calculator to connect to the internet…

Kaspersky Users in US Find Antivirus Software Automatically Replaced
24
Sep
2024

Kaspersky Users in US Find Antivirus Software Automatically Replaced

In a surprise move, Kaspersky customers in the United States have discovered that their antivirus software has been automatically replaced…

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus
23
Sep
2024

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus

RansomHub is well-known for its affiliate scheme and for employing methods to turn off or disable endpoint detection and response…

WordPress Theme & Plugin Vulnerabilities Exposes Thousands of Sites
23
Sep
2024

WordPress Theme & Plugin Vulnerabilities Exposes Thousands of Sites

Thousands of WordPress sites have been exposed to potential threats due to vulnerabilities in the Houzez theme and WordPress Houzez…

QR Code Phishing Attack Bypasses Email Security Scanners And Abuse SharePoint
23
Sep
2024

QR Code Phishing Attack Bypasses Email Security Scanners & Abuse SharePoint

Quishing, or QR code phishing, is rapidly evolving as threat actors adapt their tactics to bypass email security scanners. By…

What is BLUE TEAM?
23
Sep
2024

What is Blue Team ? Definition, Benefits, Examples

Organizations must adopt proactive measures to safeguard their digital assets. One of the most effective strategies involves collaborating with red…

Hackers Attacking Apache AXIS Server To Deploy Malicious Web Shells
23
Sep
2024

Hackers Attacking Apache AXIS Server To Deploy Malicious Web Shells

Apache Axis is a web service engine that provides the capability to add web service interfaces to web applications. It…

Hackers Allegedly Claim Leak of Oracle Data on Hacking Forum
23
Sep
2024

Hackers Allegedly Claim Leak of Oracle Data on Hacking Forum

A hacking forum post has surfaced, claiming that Oracle Corporation, a leading multinational computer technology company, has suffered a data…