Category: CyberSecurityNews

Google Cloud Platform RCE Flaw Let Attackers Execute Code on Millions of Google Servers
17
Sep
2024

GCP RCE Flaw Let Attackers Execute Code on Millions of Google Servers

Security researchers revealed this week that a critical remote code execution (RCE) vulnerability in Google Cloud Platform (GCP) could have…

Entro Security Labs Releases Non-Human Identities Research Security Advisory - GBHackers Security
16
Sep
2024

Entro Security Labs Releases Non-Human Identities Research Security Advisory

Analysis of millions of real-world NHI secrets by Entro Security Labs reveals widespread, significant risks, emphasizes need for improved Secrets…

Windows MSHTML Zero-Day Vulnerability Exploited In The Wild
16
Sep
2024

Windows MSHTML Zero-Day Vulnerability Exploited In The Wild

The Windows MSHTML platform spoofing vulnerability, CVE-2024-43461, which affects all supported Windows versions, has been exploited in the wild. CVE-2024-43461…

Critical Vulnerabilities Impact Millions Of D-Link Routers: Patch Now!
16
Sep
2024

Critical Vulnerabilities Impact Millions Of D-Link Routers: Patch Now!

In a significant security alert, millions of D-Link routers are at risk due to critical vulnerabilities that have been discovered…

New Android Malware Ajina Attacks Users To Steal Banking Login Details
16
Sep
2024

New Android Malware Ajina Attacks Users To Steal Banking Login Details

Recent developments in Android malware have revealed a concerning trend where malicious applications are increasingly capable of stealing banking login…

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT
16
Sep
2024

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

Remcos is a Remote Access Trojan (RAT) that allows attackers to gain unauthorized control over infected computers. This RAT has…

Creating An AI Honeypot To Engage With Attackers Sophisticatedly
16
Sep
2024

Creating An AI Honeypot To Engage With Attackers Sophisticatedly

In cybersecurity, a honeypot is a bait system specifically designed to attract and analyze cyber-attacks, functioning as a trap for…

What is Security Auditing?
16
Sep
2024

What is Security Auditing?

With the global cost of cybercrime reaching nearly $9.4 million in 2024, organizations are under immense pressure to protect their…

Threat Actor 888 Allegedly Claims Leak of SAP Employees Data
16
Sep
2024

Threat Actor 888 Allegedly Claims Leak of SAP Employees Data

A Twitter account known as DarkWebInformer has claimed that a notorious hacker, identified only by the alias “888,” has allegedly…

Beware of Fake AppleCare+ Service that Steals Money from Users
16
Sep
2024

Beware of Fake AppleCare+ Service that Steals Money from Users

A malicious campaign targeting Mac users seeking support or extended warranty services through AppleCare+ has been uncovered. This scam involves…

Medusa Ransomware Exploiting Fortinet Flaw For Sophisticated Attacks
16
Sep
2024

Medusa Ransomware Exploiting Fortinet Flaw For Sophisticated Attacks

The notorious Medusa ransomware group has been exploiting a critical vulnerability in Fortinet’s FortiClient EMS software to launch sophisticated ransomware…

Azure API Management Vulnerability Let Users Escalate Privileges
16
Sep
2024

Azure API Management Vulnerability Let Users Escalate Privileges

A critical vulnerability was recently discovered in Azure API Management (APIM) that allowed users with Reader-level access to escalate their…