Category: CyberSecurityNews

New MOVEit File Transfer Vulnerability Let Attackers Escalate Privileges
30
Jul
2024

New MOVEit File Transfer Vulnerability Let Attackers Escalate Privileges

Progress Software has disclosed a new high-severity vulnerability in its MOVEit Transfer file transfer solution that could allow attackers to…

Threat Monitoring & Response
30
Jul
2024

24/7 Threat Monitoring & Response for Small IT Security Teams

Maintaining continuous vigilance is essential for organizations of all sizes in the face of increasing cyber threats. However, lean IT…

North Korean Government Hacker Charged for Attacking U.S. Hospitals
30
Jul
2024

North Korean Government Hacker Charged for Attacking U.S. Hospitals

A grand jury in Kansas City has charged North Korean national Rim Jong Hyok for orchestrating a series of cyberattacks…

HealthEquity Data Breach, 4.3 Million User Data Exposed
30
Jul
2024

HealthEquity Data Breach, 4.3 Million User Data Exposed

HealthEquity, Inc., a prominent health savings account administrator, has reported a data breach affecting approximately 4.3 million individuals. The breach,…

DigiCert to Revoke Thousands of Certificates Following DNS Validation Error
30
Jul
2024

DigiCert to Revoke Thousands of Certificates Following DNS Validation Error

DigiCert, a major certificate authority, to revoke thousands of SSL/TLS certificates because of a Domain Control Verification error. This could…

Proofpoint’s Email Protection Service Exploited to Send Millions of Phishing Emails
30
Jul
2024

Proofpoint’s Email Protection Service Exploited to Send Millions of Phishing Emails

A massive phishing campaign dubbed “EchoSpoofing” has exploited a critical vulnerability in Proofpoint’s email protection service, allowing cybercriminals to send…

Ransomware Gangs Exploiting VMware ESXi Auth Bypass Flaw for Mass Attacks
30
Jul
2024

Ransomware Gangs Exploiting VMware ESXi Authentication Bypass Flaw

Microsoft researchers have found a critical vulnerability in VMware’s ESXi hypervisors. Ransomware operators are using this problem to attack systems….

Phishing Threats and Cybersecurity: How to Protect?
29
Jul
2024

Phishing Threats and Cybersecurity: How to Protect?

As Americans engage in major activities such as the 2024 presidential race, large-scale cultural festivals, and high-profile sporting events, cybersecurity…

Threat Actors Exploiting SMBs Using List of Popular Productivity Tools
29
Jul
2024

Threat Actors Exploiting SMBs Using List of Popular Productivity Tools

Due to their widespread use, popular productivity tools are often targeted and attacked by hackers. These tools create a large…

Operation ShadowCat Using Weaponized Office document To Attack Users In India
29
Jul
2024

Operation ShadowCat Using Weaponized Office document To Attack Users In India

Researchers identified a new attack campaign (“Operation ShadowCat”) using malicious LNK files distributed via spam emails, which triggers a PowerShell…

Threat Actors Using OS Command Injection Vulnerabilities To Compromise Systems
29
Jul
2024

Threat Actors Using OS Command Injection Vulnerabilities To Compromise Systems

By exploiting OS command injection vulnerabilities, threat actors can run arbitrary commands on a host operating system to obtain unauthorized…

Hackers Exploiting MSHTML vulnerability to Deliver Atlantida Malware
29
Jul
2024

Hackers Exploiting MSHTML vulnerability Deliver Atlantida Malware

Void Banshee, a threat actor, has been exploiting a critical MSHTML vulnerability, CVE-2024-38112, to distribute the Atlantida InfoStealer malware. This…