Category: CyberSecurityNews

Iranian Hackers Attacking Global Political Figures on WhatsApp
26
Aug
2024

Iranian Hackers Attacking Global Political Figures on WhatsApp

WhatsApp’s security teams have identified and blocked a cluster of malicious activities originating from Iran. The targeted campaign, linked to…

AppDomainManager Injection Technique
26
Aug
2024

Hackers use AppDomainManager Injection to Execute Malware

Cybersecurity experts have observed a surge in attacks leveraging a relatively unknown technique known as AppDomainManager Injection to execute malware…

Telegram Founder Arrested
26
Aug
2024

Founder and CEO of Telegram Messaging Service Arrested

Pavel Durov, Telegram’s 39-year-old billionaire founder and CEO, was arrested on Sunday at Le Bourget Airport near Paris. French authorities…

Cyber Security News Letter(Weekly) – Data Breaches, Vulnerability, Cyber Attack & Other Stories
25
Aug
2024

Cyber Security Weekly News Letter – Data Breaches, Vulnerability, Cyber Attack & Other Stories

In the ever-evolving landscape of cybersecurity, the past week has highlighted several critical developments and ongoing challenges faced by organizations…

New Copybara Android malware Remotely Controlling Infected Device
24
Aug
2024

New Copybara Android malware Remotely Controlling Infected Device

A new variant of Copybara, an Android malware family, has been detected to be active since November 2023 spreading through…

Researchers Decoded Stealthy Memory Malware PEAKLIGHT
24
Aug
2024

Researchers Decoded Stealthy Memory Malware PEAKLIGHT

Cybersecurity analysts at Mandiant recently identified a stealthy memory malware dubbed “PEAKLIGHT.” A Stealth memory malware is often referred to…

24
Aug
2024

Data Leaked In NPD Breach Could Be Used In Cyber Warfare

Global geopolitical tensions are as bad as they’ve been in a long time. In this context, cyber warfare threatens our…

Best Practices for Event Logging & Threat Detection
24
Aug
2024

Best Practices for Event Logging & Threat Detection

The National Security Agency (NSA) has released the Best Practices for Event Logging and Threat Detection across cloud services, enterprise…

Microsoft Edge RCE Vulnerability Let Attackers Take Control of the System Remotely
23
Aug
2024

Microsoft Edge RCE Vulnerability Let Attackers Take Control of the System

A critical remote code execution (RCE) vulnerability in Microsoft Edge has been discovered. It could allow attackers to take control…

Dell Power Manager Vulnerability Allow Attackers Gain Unauthorized Access – Patch Now!
23
Aug
2024

Dell Power Manager Vulnerability Allow Attackers Gain Unauthorized Access

Dell Technologies has identified a security vulnerability in Dell Power Manager (DPM), affecting versions 3.15.0 and prior. This vulnerability, identified…

Hackers Exploiting Amazon Services To Deliver Weaponized MSC Files
23
Aug
2024

Hackers Exploiting Amazon Services To Deliver Weaponized MSC Files

Hackers often target and exploit Amazon services due to their vast offerings, including massive computer power, storage, and global reach….

Cthulhu Stealer macOS Malware can be Renting for 0/Month to Steal Data
23
Aug
2024

Cthulhu Stealer macOS Malware can be Renting for $500/Month to Steal Data

In recent years, the belief that macOS systems are immune to malware has been increasingly challenged. With the emergence of…