Category: CyberSecurityNews

Jfrog Artifactory Flaw Let Attackers Poison Artifact Caches
06
Aug
2024

Jfrog Artifactory Flaw Let Attackers Poison Artifact Caches

A critical vulnerability identified as CVE-2024-6915 has been discovered in JFrog Artifactory, a widely used repository manager. This flaw, categorized…

Apache OFBiz Zero-Day Vulnerability Let Attackers Execute Remote Code
06
Aug
2024

Apache OFBiz Zero-Day Vulnerability Let Attackers Execute Remote Code

A critical zero-day vulnerability in Apache OFBiz, an open-source enterprise resource planning (ERP) system, has been discovered that could allow…

Bloody Wolf Attacking Organizations
05
Aug
2024

Bloody Wolf Attacking Organizations With $80 Malware From Underground Market

Cybersecurity experts have uncovered a series of attacks targeting organizations in Kazakhstan by a threat actor dubbed “Bloody Wolf.” The…

Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems
05
Aug
2024

Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems

A critical security flaw in Windows’ wallpaper handling mechanism has been uncovered. It allows attackers to gain system-level privileges on…

APT41 Hackers Attacking Research Institute with ShadowPad and Cobalt Strike
05
Aug
2024

APT41 Attacking Research Institute with ShadowPad & Cobalt Strike

Cisco Talos has unearthed a sophisticated cyber-espionage campaign targeting a Taiwanese government-affiliated research institute. The attack, attributed to the notorious…

Threat Actor Groups Using Leaked Ransomware Variants To Launch Attacks
05
Aug
2024

Threat Actor Groups Using Leaked Ransomware Variants To Launch Attacks

Ransomware operators often acquire malware through purchases on the dark web, group affiliations, and leaked source codes rather than developing…

4.6 Million Voter Database & Election Documents Exposed Online
05
Aug
2024

4.6 Million Voter Database & Election Documents Exposed Online

Cybersecurity researcher Jeremiah Fowler discovered and reported to VpnMentor about 13 non-password-protected databases containing 4.6 million documents, including sensitive voter…

Secure Model That Addresses Security And Downsides Of DNSSEC
05
Aug
2024

Secure Model That Addresses Security And Downsides Of DNSSEC

The communication between DNS recursive resolvers and authoritative nameservers is largely unsecured, making it susceptible to on-path and off-path attacks….

Rockwell Automation Devices Flaw Let Hackers Gain Unauthorized Access
05
Aug
2024

Rockwell Automation Devices Flaw Let Hackers Gain Unauthorized Access

A critical security vulnerability in Rockwell Automation’s ControlLogix and GuardLogix controllers has been discovered. This vulnerability could potentially allow attackers…

Critical Vulnerability in Digital Video Recorders Exposes 400,000 Devices to Hackers
05
Aug
2024

Critical Vulnerability in Digital Video Recorders Exposes 400,000 Devices

Multiple digital Video Recorder (DVR) devices have been identified with a critical security vulnerability, leaving over 408,000 units exposed to potential cyber-attacks….

HDMI Cables steal Passwords
05
Aug
2024

Hackers Can Use HDMI Cables to Capture Your Passwords

Security researchers have discovered a new way that hackers can steal sensitive information, like passwords. This involves eavesdropping on HDMI…

Weekly Cyber Security News Letter – Data Breaches, Vulnerability, Cyber Attack & More
04
Aug
2024

Weekly Cyber Security News Letter – Data Breaches, Vulnerability, Cyber Attack & More

Stay up to date with cybersecurity news! Our Weekly Cybersecurity Newsletter provides a curated summary of the most important updates,…