Category: CyberSecurityNews

#FreeDurov – Hacktivists Rally On Telegram For Pavel’s Release
30
Aug
2024

Hacktivists Rally On Telegram For Pavel’s Release

The events surrounding Pavel Durov’s arrest on 24 August 2024 due to Telegram’s suspected operational crimes worsened discussions on topics…

Beware of Malicious Chrome Extension Draning Crypto Wallets
30
Aug
2024

Beware of Malicious Chrome Extension Draning Crypto Wallets

Researchers discovered that a malicious Chrome extension dubbed “Bull Checker” had been targeting people on multiple Solana-related subreddits. The Jupiter…

How Threat Actors Establish Persistence on Linux Systems – Elastic Security Labs
30
Aug
2024

How Threat Actors Establish Persistence on Linux Systems

In a detailed continuation of the Linux Detection Engineering series, Elastic Security’s Ruben Groenewoud has released an in-depth exploration of…

Iran State-Sponsored Hackers Intelligence Operations Using Fake Job Offers
30
Aug
2024

Iran State-Sponsored Hackers Intelligence Operations Using Fake Job Offers

Mandiant has discovered one of the unusual Iranian counterintelligence activities that focuses on prospective agents of foreign intelligence services, especially…

Jenkins RCE Vulnerability
30
Aug
2024

Exploiting Jenkins RCE Vulnerability (CVE-2024-43044) Via Agents

A critical vulnerability has been identified in Jenkins, a widely used automation server. If exploited further, this vulnerability allows attackers…

What is an Access Control Lists (ACLs)?
30
Aug
2024

What is Access Control List?

Access Control Lists (ACLs) are fundamental to network security and management. They are critical in determining who or what can…

VirusTotal for Threat Research
30
Aug
2024

VirusTotal for Threat Research – A Comprehensive Guide 2024

VirusTotal is an essential tool for cybersecurity professionals. It offers a comprehensive platform for analyzing files, URLs, domains, and IP…

Rocinante Malware Taking Over The Android Device Remotely
30
Aug
2024

Rocinante Malware Taking Over The Android Device Remotely

The ever-evolving malware landscape is evolving at an alarming rate, as a multitude of new strains have already been noticed….

iOS & Chrome Exploits
29
Aug
2024

State-Sponsored Hackers Repeatedly Using Same iOS & Chrome Exploits

Google’s Threat Analysis Group (TAG) has reported the discovery of multiple exploit campaigns targeting Mongolian government websites, spanning from November…

Beware! Cybercriminals Exploited Digital Marketing Tools to Launch Malicious Campaigns
29
Aug
2024

Hackers Exploited Digital Marketing Tools to Launch Malicious Campaigns

Researchers from Mandiant and Google have uncovered how cybercriminals are repurposing digital analytics and advertising tools to enhance their malicious…

AutoIT Malware Attacking Gmail Users To Steal Login Credentials
29
Aug
2024

AutoIT Malware Attacking Gmail Users To Steal Login Credentials

A malicious AutoIT-compiled executable has been discovered that attempts to open Gmail login pages using popular browsers and possesses capabilities…

RansomHub Exploiting RDP Services To Exfiltrate Large Volumes Of Data
29
Aug
2024

RansomHub Exploiting RDP Services To Exfiltrate Large Volumes Of Data

Ransomware-as-a-Service (RaaS) significantly lowers the technical barriers for threat actors to launch ransomware attacks, even it also enables threat actors…