Category: CyberSecurityNews

Fickle Stealer Attacking Windows Machine To Steal Sensitive Data
20
Jun
2024

Fickle Stealer Attacking Windows Machine To Steal Sensitive Data

Hackers often abuse stealers to steal login credentials, financial data, and identity theft data hidden in the infected computer systems….

Fortra Warns of Hard-Coded Password Vulnerability in The Filecatalyst
20
Jun
2024

Fortra Warns of Hard-Coded Password Vulnerability in Filecatalyst

Fortra has issued a critical security advisory regarding a hard-coded password vulnerability in its FileCatalyst software, explicitly affecting the TransferAgent…

Hackers Weaponizing Vortex Meeting Software To Attack macOS Users
20
Jun
2024

Hackers Weaponizing Vortex Meeting Software To Attack macOS Users

Threat actors leverage meeting software applications and tools to penetrate weak security loopholes, infiltrate secure settings and organizations, steal highly…

How Difficult is Analyzing Malware Shielded by Themida and VMProtect – SOC/DFIR Guide
19
Jun
2024

How Difficult is Analyzing Malware Shielded by VMProtect

Researchers analyzed six malware families that are using the protectors Themida and VMProtect. None of the samples used code virtualization,…

Hackers Using Weaponized Word Documents In QR Code Phishing Attacks
19
Jun
2024

Hackers Using Weaponized Docs In QR Code Phishing Attacks

Hackers often abuse weaponized Word docs, as they can contain macros that contain or exploit flaws inside those Word files…

Google Chrome Patches Six High-Severity Vulnerabilities
19
Jun
2024

Google Chrome Patches Six High-Severity Vulnerabilities

Google has released a critical security update for its Chrome browser, addressing six high-severity vulnerabilities that could potentially lead to…

AI-Powered Browsers Detecting Zero-Day Phishing Attacks in High Accuracy
19
Jun
2024

AI-Powered Browsers Detecting Zero-Day Phishing Attacks

Researchers have developed a real-time browser extension integrated with machine learning algorithms to detect phishing websites with remarkable accuracy. This…

ShrinkLocker Uses Windows BitLocker Utility To Infect Computers
19
Jun
2024

ShrinkLocker Uses Windows BitLocker Utility To Infect Computers

Hackers exploit the Windows BitLocker tool, as this utility offers a very powerful tool for selectively encrypting access to the…

Critical Vulnerability in Trellix IPS Manager (CVE-2024-5671) Allows Remote Code Execution
19
Jun
2024

Vulnerability in Trellix IPS Manager Allows Remote Code Execution

Trellix has patched a critical security vulnerability in its Intrusion Prevention System (IPS) Manager, CVE-2024-5671. This flaw, caused by insecure…

Microsoft Detect Compromised Devices
18
Jun
2024

Microsoft Details Ways To Detect Compromised Devices In Your Organization

Microsoft has announced a new way to spot potentially hacked machines in your organization.  Analysts may now easily identify, examine,…

Hackers Attacking Hotel Owners & Employees as Potential Guests
18
Jun
2024

Hackers Attacking Hotel Owners & Employees as Potential Guests

Since last summer, hotel owners and employees have grappled with a surge in malicious e-mails disguised as ordinary correspondence from…

Hackers Leveraging New Social Engineering To Run PowerShell
18
Jun
2024

Hackers Leveraging New Social Engineering To Run PowerShell

Hackers use social engineering as it focuses on the psychological rather than technological aspects of security flaws, consequently easily tricking…