GHOSTPULSE Hides Within PNG File Pixel Structure To Evade Detections
The popularity of PNG files combined with their widespread use on the internet makes them an attractive vector for threat actors. They also target PNG…
The popularity of PNG files combined with their widespread use on the internet makes them an attractive vector for threat actors. They also target PNG…
Security researchers have uncovered a new phishing campaign targeting users of the popular open-source Roundcube webmail software. Unknown threat actors are exploiting a now-patched cross-site…
Hackers impersonated ESET, a prominent cybersecurity firm, to attack organizations with destructive wiper malware. The attack, which began on October 8, 2024, involved a phishing…
A new AI tool named Vulnhuntr has been introduced, revolutionizing the way vulnerabilities are discovered in open-source projects. This innovative tool leverages the power of…
The Internet Archive has fallen victim to another cyberattack, marking the third major security incident in October 2024. On October 20, hackers successfully exploited unrotated…
Welcome to this week’s Cybersecurity Newsletter, bringing you the latest updates and insights from the world of cybersecurity. Stay informed and protected with our top…
Cisco, has launched an investigation into a potential cyber security incident and has taken its public DevHub portal offline as a precautionary measure. On October…
Bitdefender Total Security has been found vulnerable to Man-in-the-Middle (MITM) attacks due to improper certificate validation in its HTTPS scanning functionality. This vulnerability, identified under…
WebRTC (Web Real-Time Communication) is an open-source project that facilitates real-time audio, video, and data sharing directly between web browsers and mobile applications without the…
A critical vulnerability has been identified in SolarWinds Web Help Desk, potentially allowing attackers to execute remote code on affected systems. The Trend Micro Zero…
Cisco has issued a critical security advisory concerning multiple vulnerabilities in its ATA 190 Series Analog Telephone Adapters. These vulnerabilities could potentially allow remote attackers…
A critical vulnerability in F5 BIG-IP, a popular network traffic management and security solution tracked as CVE-2024-45844, allows authenticated attackers to bypass access control restrictions…