Category: CyberSecurityNews

Critical ASUS Router Flaw Attacker Executes Arbitrary Commands
17
Jun
2024

Critical ASUS Router Flaw Attacker Executes Arbitrary Commands

A critical vulnerability has been discovered in several models of ASUS routers. It allows unauthenticated remote attackers to execute arbitrary…

Cyber Security News Weekly Round-Up June
16
Jun
2024

Cyber Security News Weekly Round-Up Vulnerabilities & Cyber Attacks

Our weekly summary of cybersecurity news provides information on the most recent threats, vulnerabilities, innovations, attacks, dangers, and stories in…

Bondnet Using High-Performance Bots For C2 Server
14
Jun
2024

Bondnet Using High-Performance Bots For C2 Server

Threat actors abuse high-performance bots to carry out large-scale automated attacks efficiently. These bots can work quickly, flood systems, steal…

Discord-Based Malware Attacking Orgs Linux Systems In India
14
Jun
2024

Discord-Based Malware Attacking Orgs Linux Systems In India

Linux systems are deployed mostly in servers, in the cloud, and in environments that are considered vital; consequently, they are…

New Moonstone Sleet North Korean Actor Deploying Malicious Open Source Packages
14
Jun
2024

New Moonstone Sleet North Korean Actor Deploying Malicious Packages

In December 2023, we reported on how North Korean threat actors, particularly Jade Sleet, have been compromising supply chains through…

Life360 Breach: Hackers Accessed the Tile Customer Support Platform
14
Jun
2024

Hackers Accessed Tile Customer Support Platform

Life360, a company known for its family safety services, recently fell victim to a criminal extortion attempt. The company received…

Windows AI Recall Delayed
14
Jun
2024

Microsoft Delays Release of Controversial Windows AI Recall Tool

Microsoft has announced that it will delay the broad release of its AI-powered Recall feature for Windows Copilot+ PCs, following…

A Modular Malware With Range Of Capabilities
13
Jun
2024

A Modular Malware With Range Of Capabilities

Hackers misuse malware for diverse illicit intentions, including data theft, disrupting systems, espionage, or distortion for unethical monetary benefits. Besides…

Hackers Abuse Windows Search Functionality To Deploy Malware
13
Jun
2024

Hackers Abuse Windows Search Functionality To Deploy Malware

Hackers use Windows Search’s vulnerability to penetrate different layers and rooms in the client’s systems and execute unauthorized code by…

Github Paid ,000,000 In Rewards For Bug Bounty Program
13
Jun
2024

Github Paid $4,000,000 In Rewards For Bug Bounty Program

GitHub, the world’s leading software development platform, is celebrating a milestone: the 10th anniversary of its Security Bug Bounty program….

Kulicke & Soffa Data Breach – 12 Million Files Leaked
13
Jun
2024

Kulicke & Soffa Data Breach

Kulicke and Soffa Industries, Inc. (K&S), a leading semiconductor packaging and electronic assembly solutions provider, has disclosed a data breach…

Threat Actor Claiming of Israel’s Government API Database
13
Jun
2024

Threat Actor Claiming of Israel’s Government API Database

A threat actor has claimed responsibility for breaching Israel’s government API database. The announcement was made via a post on…