Category: CyberSecurityNews

Google Critical Security Update Chrome
31
Jul
2024

Google Releases Critical Security Update for Chrome

Google has rolled out a critical security update for its Chrome browser, addressing a severe flaw that could lead to…

Beware of Malicious Crypto Management App that Drains Your Wallet
31
Jul
2024

Beware of Malicious Crypto Management App that Drains Your Wallet

Cryptocurrency scams are becoming increasingly sophisticated. This article delves into the intricacies of these scams, providing insights into how they…

Hackers Actively Exploiting GeoServer RCE Flaw, 6635 Servers Vulnerable
31
Jul
2024

Hackers Actively Exploiting GeoServer RCE Flaw, 6635 Servers Vulnerable

A critical vulnerability in GeoServer, an open-source Java-based software server, has put thousands of servers at risk. The flaw, CVE-2024-36401,…

Multiple SMTP Servers Vulnerable to Spoofing Attacks, Let Hackers Bypass Authentication
31
Jul
2024

Multiple SMTP Servers Vulnerable to Spoofing Attacks

A recent discovery has unveiled vulnerabilities in multiple hosted, outbound SMTP servers, allowing authenticated users and certain trusted networks to…

DDoS Attack Microsoft Azure
31
Jul
2024

DDoS Attack Leads to Microsoft Azure Global Outage

On July 30, 2024, Microsoft experienced a significant global outage affecting its Azure cloud services and Microsoft 365 products. The…

Tycoon 2FA Phish-kit
31
Jul
2024

Tycoon 2FA Phish-kit Exploits Amazon SES to Steal User Credentials

A sophisticated phishing campaign with Tycoon 2FA Phish-kit has been identified, leveraging Amazon Simple Email Service (SES) and a series…

Record-breaking Ransom Payment
31
Jul
2024

Dark Angels Ransomware Received $75 Million

Cybersecurity firm Zscaler has revealed that the Dark Angels ransomware group received an unprecedented $75 million ransom payment from a…

How to Collect and Use IOCs From Malware Configs IN TI Lookup
30
Jul
2024

How to Collect and Use IOCs From Malware Configs IN TI Lookup

Indicators of Compromise (IOCs) are key forensic data points used to detect security breaches. They include file hashes, suspicious IP…

iPhone Users Beware! Fake Postal Messages Stealing Your Login Credentials
30
Jul
2024

iPhone Users Beware! Fake Postal Messages Stealing Your Login Credentials

Cybercriminals have launched a smishing campaign targeting iPhone users in India, impersonating India Post. Malicious iMessages falsely claim a package…

Cuckoo Spear Attacking Windows Users With Highly Sophisticated Malware
30
Jul
2024

Cuckoo Spear Attacking Windows Users With Highly Sophisticated Malware

Researchers uncovered Cuckoo Spear, a new threat actor associated with the APT10 group, demonstrating persistent stealthy operations within victim networks…

Microsoft Azure Down
30
Jul
2024

Microsoft Azure Globally Down – What’s Happening!

On July 30, 2024, at approximately 13:13 UTC, Microsoft Azure & Microsoft 365 reported a global outage affecting a subset…

Researchers Hacked into Medusa Ransomware Group’s Cloud Storage
30
Jul
2024

Researchers Hacked into Medusa Ransomware Group’s Cloud Storage

The Medusa Ransomware Group experienced significant operational security (OPSEC) failure, which was primarily due to the group’s use of Rclone,…