Category: CyberSecurityNews

CISA Warns of Five Vulnerabilities Actively Exploited in the Wild
19
Sep
2024

CISA Warns of Five Vulnerabilities Actively Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding five critical vulnerabilities that are being actively…

SambaSpy Attacking Windows Users With Weaponized PDF Files
19
Sep
2024

SambaSpy Attacking Windows Users With Weaponized PDF Files

Threat actors often make use of weaponized PDF files as they enable them to deliver malware and execute attacks through…

Cyber Attack Dr.Web Server
19
Sep
2024

Cyber Attack on Security Firm Dr.Web Forces Servers Disconnection

In a recent cyberattack, Russian cybersecurity firm Doctor Web (Dr.Web) was forced to disconnect all its servers to mitigate the…

Chinese Hackers Hijacked Routers & IoT Devices to Create Botnet, NSA Warns
18
Sep
2024

Chinese Hackers Hijacked Routers & IoT Devices to Create Botnet, NSA Warns

A joint cybersecurity advisory issued by the Federal Bureau of Investigation (FBI), Cyber National Mission Force (CNMF), and National Security…

SpyCloud Unveils Massive Scale of Identity Exposure Due to Infostealers, Highlighting Need for Advanced Cybersecurity Measures
18
Sep
2024

SpyCloud Unveils Massive Scale of Identity Exposure Due to Infostealers, Highlighting Need for Advanced Cybersecurity Measures

Research indicates that an infostealer malware infection is often a precursor to a ransomware attack SpyCloud, the leader in Cybercrime…

ANY.RUN Malware Sandbox with Splunk
18
Sep
2024

SOC Analysts Can Now Use ANY.RUN Malware Sandbox with Splunk

Splunk users can now leverage ANY.RUN’s sandbox and threat intelligence directly within their Splunk SOAR environment. This allows for the…

Ghost Cybercrime Platform Dismantled, Admin Charged
18
Sep
2024

Ghost Cybercrime Platform Dismantled, Admin Charged

Law enforcement agencies have successfully dismantled “Ghost,” a sophisticated encrypted communication platform allegedly designed exclusively for criminal use. The operation,…

What is Block Cipher?
18
Sep
2024

what is Block Cipher?

Block ciphers are a fundamental component of modern cryptography, crucial in securing data across various digital platforms. Unlike stream ciphers,…

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader
18
Sep
2024

UNC2970 Hackers Targeting Job Seekers with Weaponized PDF Files

Trojanized PDF readers are malicious software that are disguised as legitimate PDF viewing applications.  They are primarily used by the…

INE Security Wins 2024 SC Excellence Award
18
Sep
2024

INE Security Wins 2024 SC Excellence Award

INE Security is proud to announce that it has been named a winner in the prestigious 2024 SC Awards, named…

Microsoft Warns Of Windows Kernel Vulnerability Exploitation
18
Sep
2024

Microsoft Warns Of Windows Kernel Vulnerability Exploitation

Microsoft has issued a critical warning regarding a Windows kernel vulnerability that could lead to the disclosure of sensitive information….

Beware of New AliGater Attacking Outdated Windows Users
18
Sep
2024

Beware of New AliGater Attacking Outdated Windows Users

Malvertising (malicious advertising) refers to the practice of embedding harmful code within online advertisements, which can lead to malware infections…