Category: CyberSecurityNews

Kibana Vulnerabilities Let Attackers Execute Arbitrary Code
09
Sep
2024

Kibana Vulnerabilities Let Attackers Execute Arbitrary Code

Elastic has disclosed two critical vulnerabilities affecting Kibana, the popular data visualization and exploration tool used with Elasticsearch. These vulnerabilities,…

Fog Ransomware Group Attacking Employees of Financial Services Sector
09
Sep
2024

Fog Ransomware Group Attacking Employees of Financial Services Sector

The Fog, a ransomware variant belonging to the STOP/DJVU family that was formerly targeting educational and recreational SECTORS, has turned…

Bitcoin ATMs Now Become as a Playground for Scammers
09
Sep
2024

Bitcoin ATMs Now Become as a Playground for Scammers

Bitcoin ATMs (BTMs) have emerged as a convenient tool for cryptocurrency transactions, but they have also become a hotbed for…

Critical IBM webMethods Vulnerabilites Let Attackers Execute Arbitrary Commands
09
Sep
2024

IBM webMethods Vulnerabilites Let Attackers Execute Arbitrary Commands

IBM has disclosed multiple critical vulnerabilities in its webMethods Integration Server, potentially allowing attackers to execute arbitrary commands on affected…

Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability, Cyber Attack & Other Stories
08
Sep
2024

Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability

Welcome to this week’s edition of our Cybersecurity Newsletter, your go-to source for the latest developments, insights, and expert analysis…

Veeam Software Vulnerabilities Let Attackers Trigger Remote Code Execution
08
Sep
2024

Veeam Software Vulnerabilities Let Attackers Trigger Remote Code Execution

Veeam Software, a leading backup, recovery, and data management solutions provider, has announced the discovery and remedy of several critical…

What is ACK Piggybacking?-Definition, Attack Types & Prevention
06
Sep
2024

What is ACK Piggybacking?-Definition, Attack Types & Prevention

Piggybacking is a term relevant to computer networking and cybersecurity. It describes techniques that aim to optimize data transmission and,…

PoC Exploit Released for Linux Kernel Vulnerability
06
Sep
2024

PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access

Google Released a Proof-of-Concept (PoC) for a critical security vulnerability, identified as CVE-2024-26581, which has been discovered in the Linux…

Linux Pluggable Authentication Modules Abused to Create Backdoors
06
Sep
2024

Linux Pluggable Authentication Modules Abused to Create Backdoors

The Group-IB Digital Forensics and Incident Response (DFIR) team has uncovered a novel technique that exploits Linux’s Pluggable Authentication Modules…

SonicWall Warns of Access Control Vulnerability Exploited in the Wild
06
Sep
2024

SonicWall Warns of Access Control Vulnerability Exploited in the Wild

SonicWall has issued an urgent security advisory regarding a critical vulnerability (CVE-2024-40766) affecting its firewall products. The company warns that…

Researcher Details Exploitation of Exchange PowerShell via MultiValuedProperty
06
Sep
2024

Exploitation of Exchange PowerShell via MultiValuedProperty

OffensiveCon 2024 devised multiple methods to exploit Microsoft Exchange. One method was using the MultiValuedProperty, through which a researcher was…

Critical Progress LoadMaster Vulnerability Let Attackers Execute Arbitrary Code
06
Sep
2024

Critical Progress LoadMaster Vulnerability – Attackers Execute Arbitrary Code

A critical vulnerability has been identified in the LoadMaster product line, including all LoadMaster releases and the LoadMaster Multi-Tenant (MT)…