Category: CyberSecurityNews

Beware Of Fake Palo Alto Tool That Delivers Sophisticated Malware
29
Aug
2024

Beware Of Fake Palo Alto Tool That Delivers Sophisticated Malware

A sophisticated malware targeting organizations in the Middle East is posing a significant threat. Disguised as a legitimate Palo Alto…

Microsoft Sway Abused By Threat Actors To Steal Login Credentials
29
Aug
2024

Microsoft Sway Abused By Threat Actors To Steal Login Credentials

Researchers observed a significant surge in phishing attacks targeting MS Office credentials via Microsoft Sway in July 2024, where attackers…

Cisco NX-OS Software Vulnerability Let Attackers Trigger DoS Condition
29
Aug
2024

Cisco NX-OS Software Vulnerability Let Attackers Trigger DoS Condition

Cisco has disclosed a critical vulnerability in its NX-OS software that could allow unauthenticated, remote attackers to cause a denial…

Corona Mirai Botnet Exploiting RCE Zero-Day To Hire New Bots
29
Aug
2024

Corona Mirai Botnet Exploiting RCE Zero-Day To Hire New Bots

A botnet is exploiting a new zero-day vulnerability, CVE-2024-7029, in AVTECH CCTV cameras to spread a Mirai variant, which is…

Dell BIOS Flaw Alienware
29
Aug
2024

Hackers Could Exploit Dell BIOS Flaw to Hijack Compromised Systems

A critical vulnerability in the Dell Client Platform BIOS has been identified, potentially allowing hackers to hijack compromised systems. This…

Check Point to Acquire Cyberint Technologies to Enhance Threat Intelligence
29
Aug
2024

Check Point to Acquire Cyberint Technologies to Enhance Threat Intelligence

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a prominent player in the cybersecurity industry, has announced a definitive agreement to…

Wireshark 4.4.0 Released – What’s New!
29
Aug
2024

Wireshark 4.4.0 Released – What’s New!

The Wireshark Foundation has announced the release of Wireshark 4.4.0, bringing a host of new features, improvements, and bug fixes…

Multiple Vulnerabilities in AI Platforms Exposes Sensitive Data to Anyone
28
Aug
2024

Multiple Vulnerabilities in AI Platforms Exposes Sensitive Data to Anyone

Artificial intelligence (AI) platforms have become integral tools for businesses and organizations worldwide. These technologies promise efficiency and innovation, from…

BlackByte VMware ESXi Auth Bypass Flaw
28
Aug
2024

BlackByte Hackers Exploiting VMware ESXi Auth Bypass Flaw to Deploy Ransomware

Security researchers have discovered that the BlackByte ransomware group is actively exploiting a recently patched authentication bypass vulnerability in VMware…

Rewards Up To .5 Million for Angler Exploit Kit Developer
28
Aug
2024

Rewards Up To $2.5 Million for Angler Exploit Kit Developer

The U.S. Department of State has announced a reward of up to $2.5 million for information leading to Volodymyr Kadariya’s…

Zero-Day Vulnerability WPS Office
28
Aug
2024

APT Hackers Exploiting Zero-Day Vulnerabilities in WPS Office

ESET researchers have uncovered two critical zero-day vulnerabilities in WPS Office for Windows, exploited by the advanced persistent threat (APT)…

HZ Rat Attacking macOS Users Via Messaging Platform WeChat
28
Aug
2024

HZ Rat Attacking macOS Users Via Messaging Platform WeChat

Hackers target macOS as its growing user base makes it an increasingly attractive target.  Despite its reputation for strong security,…