Category: CyberSecurityNews

Beware of WhatsApp Verification Code Attacks that Steal Payments
26
Aug
2024

Beware of WhatsApp Verification Code Attacks that Steal Payments

The National Cyber Security Centre (NCSC) of Ireland has warned about a growing trend of WhatsApp verification code scams targeting…

Hillstone WAF Vulnerability Let Attackers Execute Command Injection Attacks
26
Aug
2024

Hillstone WAF Vulnerability Let Attackers Execute Command Injection Attacks

The Hillstone WAF is designed to provide enterprise-class security for web servers, applications, and APIs from various cyber threats. It…

DoS Exploit Mirai Botnet
26
Aug
2024

Researchers Uncovered Remote DoS Exploit in Mirai Botnet

Mirai botnets have played a major role in DDoS attacks worldwide specifically against IoT devices and servers. Mirai was discovered…

Stealthy Linux Malware 'Sedexp' Having Zero-detections Since 2022
26
Aug
2024

Stealthy Linux Malware ‘Sedexp’ Having Zero-detections Since 2022

Hackers often abuse Linux malware since Linux systems are widely used in critical servers and infrastructure for their operation. By…

ValleyRAT Malware Attack Windows Systems Using Microsoft Office Doc
26
Aug
2024

ValleyRAT Malware Attack Windows Systems Using Microsoft Office Doc

Researchers at ANY.RUN uncovered a sophisticated attack targeting Chinese-speaking users. The attack is spreading multi-stage malware known as ValleyRAT, which is designed…

Russian Cybercrime Group Member Charged for Hacking Computers Around Globe
26
Aug
2024

Russian Cybercrime Member Charged for Hacking Computers

Deniss Zolotarjovs, 33, from Moscow, Russia, was charged with federal crimes in the U.S. District Court in Cincinnati today. A…

Cyber Threat Intelligence
26
Aug
2024

What is Cyber Threat Intelligence (CTI)

Cyber Threat Intelligence (CTI), also known as Threat Intelligence or Threat Intelligence, is a critical practice in cybersecurity. It involves…

BlackSuit Ransomware Timeline
26
Aug
2024

BlackSuit Ransomware Deployed After 15 Days From Initial Access

Threat actors successfully deployed BlackSuit ransomware after maintaining access to a compromised network for 15 days. The intrusion, which began…

Traccar GPS System Vulnerability Let Attackers Execute Remote Code
26
Aug
2024

Traccar GPS System Vulnerability-Attackers Execute Remote Code

Two critical vulnerabilities have been discovered in the Traccar GPS. These vulnerabilities, CVE-2024-31214 and CVE-2024-24809, allow unauthenticated attackers to execute…

Obfuscation Techniques to Evade Anti-Virus
26
Aug
2024

New Malware Employs Crazy Obfuscation Techniques to Evade Anti-Virus Detection

Security researchers have recently identified a new malware strain that employs advanced obfuscation techniques to evade detection by antivirus software….

D(HE)at Attack
26
Aug
2024

D(HE)at Attack – Attackers Exploit20-years-old Diffie-Hellman Protocol To Over-Heat Your CPU

Researchers uncovered a new type of denial-of-service (DoS) attack, known as the D(HE)at attack, exploits the computational demands of the…

Iranian Hackers Attacking Global Political Figures on WhatsApp
26
Aug
2024

Iranian Hackers Attacking Global Political Figures on WhatsApp

WhatsApp’s security teams have identified and blocked a cluster of malicious activities originating from Iran. The targeted campaign, linked to…