Category: CyberSecurityNews

New Latrodectus Attacking Users with Enhanced Capabilities & Evasion Techniques
02
Sep
2024

New Latrodectus Attacking Users with Evasion Techniques

The Latrodectus malware has been observed to have enhanced capabilities and sophisticated evasion techniques. Initially discovered by Walmart in October…

Threat Actor Exploits Chromium Zero-Day
02
Sep
2024

North Korean Hackers Exploits Chromium Zero-Day Vulnerability

Microsoft discovered a North Korean threat actor exploiting a zero-day vulnerability in the Chromium browser, identified as CVE-2024-7971. This vulnerability,…

Record-Breaking 3.15 Billion Packets Per Second DDOS Attack Towards Minecraft Server
02
Sep
2024

Record-Breaking 3.15 Billion Packets Per Second DDOS Attack Towards Minecraft Server

Global Secure Layer (GSL) successfully mitigated the most considerable packet rate of the Distributed Denial of Service (DDoS) attack ever…

Cicada3301 Ransomware Attacks Windows and Linux/ESXi Hosts
02
Sep
2024

Cicada3301 Ransomware Targets Windows and Linux/ESXi Hosts

A new ransomware group, Cicada3301, has emerged, targeting Windows and Linux/ESXi hosts with sophisticated encryption techniques. First observed in June…

Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability, Cyber Attack & Other Stories
01
Sep
2024

Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability

Welcome to this week’s edition of our Weekly Cybersecurity Newsletter, your go-to source for the latest developments and insights in the…

Iranian Hackers Attacking US Organizations To Deploy Ransomware
30
Aug
2024

Iranian Hackers Attacking US Organizations To Deploy Ransomware

As of August 2024, Iran-based cyber actors continue to exploit U.S. and foreign organizations across multiple sectors. The primary sectors…

Hackers Delivers Lumma Stealer Via Public GitHub Commands
30
Aug
2024

Hackers Delivers Lumma Stealer Via Public GitHub Commands

Threat actors often target the popular code repository platform “GitHub” due to it’s wide use, and features that this platform…

Malware Obfuscation
30
Aug
2024

Malware Obfuscation Techniques – A Complete Guide

In the ever-evolving landscape of cybersecurity, malware obfuscation techniques are advancing rapidly. As security measures improve, so do malicious actors’…

INE Security Named 2024 SC Awards Finalist
30
Aug
2024

INE Security Named 2024 SC Awards Finalist

Cary, North Carolina, August 30th, 2024, CyberNewsWire: INE Security is pleased to announce that it has been recognized as a…

#FreeDurov – Hacktivists Rally On Telegram For Pavel’s Release
30
Aug
2024

Hacktivists Rally On Telegram For Pavel’s Release

The events surrounding Pavel Durov’s arrest on 24 August 2024 due to Telegram’s suspected operational crimes worsened discussions on topics…

Beware of Malicious Chrome Extension Draning Crypto Wallets
30
Aug
2024

Beware of Malicious Chrome Extension Draning Crypto Wallets

Researchers discovered that a malicious Chrome extension dubbed “Bull Checker” had been targeting people on multiple Solana-related subreddits. The Jupiter…

How Threat Actors Establish Persistence on Linux Systems – Elastic Security Labs
30
Aug
2024

How Threat Actors Establish Persistence on Linux Systems

In a detailed continuation of the Linux Detection Engineering series, Elastic Security’s Ruben Groenewoud has released an in-depth exploration of…