Category: CyberSecurityNews

PoC Exploit Published for Linux Kernel Privilege Escalation Flaw
01
Jul
2024

PoC Exploit Published for Linux Kernel Privilege Escalation Flaw

A critical use-after-free vulnerability has been discovered in the Linux kernel’s netfilter subsystem. This vulnerability could potentially allow local, unprivileged…

Water Sigbin Hackers Exploit Oracle WebLogic Vulnerabilities
01
Jul
2024

Water Sigbin Hackers Exploit Oracle WebLogic Vulnerabilities

Cybersecurity researchers uncovered a sophisticated attack campaign by the Water Sigbin (aka 8220 Gang) threat actor that exploited vulnerabilities in…

Google Chrome to Block Entrust SSL
30
Jun
2024

Google Chrome to Block Entrust SSL Certificates Starting November

Google has announced that its Chrome browser will stop trusting TLS server authentication certificates issued by Entrust and AffirmTrust starting…

How to reduce risk during SAP S/4HANA Migration with Automation
29
Jun
2024

How to reduce risk during SAP S/4HANA Migration with Automation

Transitioning to SAP Cloud offers many advantages—from improved performance to easier data models—but it also increases a couple of inherent…

Hackers Created 250 npm Packages, Mimicking Popular AWS And Microsoft Projects
29
Jun
2024

Hackers Created 250 npm Packages, Mimicking Popular AWS And Microsoft Projects

Hackers target and abuse npm packages to inject malicious code into widely used software libraries, reaching many developers and applications….

ISP Sends Malware to Thousands of Customers to Stop Using File-Sharing Services
28
Jun
2024

ISP Sends Malware to Customers to Stop Using File-Sharing Services

JTBC, a prominent Korean news organization, has uncovered that KT Corporation, one of South Korea’s largest telecom providers, deliberately infected…

Beware Of "TRANSLATEXT" Chrome Extension From North Korean Hackers
28
Jun
2024

Beware Of “TRANSLATEXT” Chrome Extension From North Korean Hackers

Hackers abuse Chrome extensions since they can embed malware on many targets by using common extensions in the browser. These…

Juniper Session Smart Router Flaw Let Attackers Bypass Vulnerability
28
Jun
2024

Juniper Session Smart Router Flaw

Juniper Networks has disclosed a critical vulnerability (CVE-2024-2973) affecting its Session Smart Router (SSR) and Session Smart Conductor products. The…

Beware of Weaponized Notezilla, RecentX, & Copywhiz Windows Tools that Deliver Stealing Malware
28
Jun
2024

Beware of Weaponized Notezilla, RecentX, & Copywhiz Tools

 Cybersecurity firm Rapid7 has identified that popular Windows tools Notezilla, RecentX, and Copywhiz have been weaponized to deliver malware. These…

TeamViewer Hacked: Attackers Accessed Internal Corporate IT Environment
28
Jun
2024

Attackers Accessed Internal Corporate IT Environment

On Wednesday, June 26, 2024, TeamViewer, a leading provider of remote access software, announced that attackers had compromised its internal…

Infinidat Revolutionizes Enterprise Cyber Storage Protection to Reduce Ransomware and Malware Threat Windows
27
Jun
2024

Infinidat Revolutionizes Enterprise Cyber Storage Protection to Reduce Ransomware and Malware Threat Windows

Infinidat, a leading provider of enterprise storage solutions, has introduced a new automated cyber resiliency and recovery solution that will…

Microsoft Unveils New AI Jailbreak That Allows Execution Of Malicious Instructions
27
Jun
2024

Microsoft Unveils New AI Jailbreak That Allows Execution Of Malicious Instructions

⁤Hackers frequently look for new ways to bypass the ethical and safety measures incorporated into AI systems. This gives them…