Category: CyberSecurityNews

Telerik Report Server Flaw Let Remote Attackers Bypass Authentication
05
Jun
2024

Telerik Report Server Flaw Let Remote Attackers Bypass Authentication

Progress-owned Telerik Report Server addressed two vulnerabilities in its system, which were associated with Authentication bypass and Insecure Deserialization. To…

Europol Starts Hunting For Emotet Malware Developer And Mastermind
05
Jun
2024

Europol Starts Hunting For Emotet Malware Developer And Mastermind

The Europol-led Operation Endgame focuses on the individual threat actors operating behind the botnets. Cyberlaw enforcement is very dedicated to…

Databricks Is Acquiring Tabular, A Data-Management Startup
05
Jun
2024

Databricks Is Acquiring Tabular, A Data-Management Startup

Databricks has announced its acquisition of Tabular, Inc., a data management startup founded by Ryan Blue, Daniel Weeks, and Jason…

Hackers Employ JavaScript Framework To Trick Users Copy, Paste And Command Execution
05
Jun
2024

Hackers Employ JavaScript Framework To Trick Users Copy, Paste And Command Execution

Hackers use JavaScript frameworks since they offer a wide range of functionalities and tools that could be used to bypass…

NSA Warns iPhone & Android Users
05
Jun
2024

NSA Warns iPhone & Android Users to Restart Devices Once a Week

The National Security Agency (NSA) has recommended that all iPhone and Android users restart their devices at least once a…

Linux Kernel Privilege Escalation Flaw
05
Jun
2024

PoC Exploit Released for Linux Kernel Privilege Escalation Flaw

A Proof-of-Concept (PoC) exploit has been released for a critical privilege escalation vulnerability in the Linux kernel. The vulnerability tracked…

TikTok Zero-Day Vulnerability
05
Jun
2024

TikTok Zero-Day Flaw Exploited to Hijack High-Profile Accounts

TikTok has confirmed that hackers exploited a zero-day vulnerability in its direct messaging (DM) feature to hijack several high-profile accounts….

ANY RUN Sandbox Added New Features to Analyse Sophisticated Malware
05
Jun
2024

ANY RUN Sandbox Added New Features to Analyse Sophisticated Malware

ANY.RUN revamped their user interface for a more streamlined workflow, as the sandbox homepage now features shortcut buttons for launching…

Hackers Weaponize Authentication Tools To Deliver NiceRAT malware via Botnet
04
Jun
2024

Hackers Weaponize Authentication Tools To Deliver NiceRAT malware via Botnet

Botnets, traditionally used for DDoS attacks with malware like Nitol, are now being built with malware capable of data exfiltration…

How weak credentials put MSPs & clients at risk
04
Jun
2024

How weak credentials put MSPs & clients at risk

Managed IT Service Providers (MSPs) and Managed Security Service Providers (MSSPs) are entrusted with safeguarding a vast amount of sensitive…

Microsoft Azure Vulnerability Let Attackers Bypass Firewall Rules
04
Jun
2024

Microsoft Azure Vulnerability Let Attackers Bypass Firewall Rules

Tenable Research has uncovered a significant vulnerability in Microsoft Azure that allows malicious attackers to bypass firewall rules by forging…

Confluence Data Center & Server Flaw Allows Remote Code Execution
04
Jun
2024

Confluence Data Center & Server Flaw Allows Remote Code Execution

Atlassian disclosed a high-severity vulnerability that exists in multiple versions of their Confluence Data Center and Server. The CVE for…