Category: CyberSecurityNews

Russian Hackers Charged For Selling Unauthorized Access To Computer Networks
29
May
2024

Russian Hackers Charged For Selling Unauthorized Access

A Russian citizen has been indicted for working as an “access broker” and selling unauthorized access to computer networks, including…

PoC Exploit Released for Critical Fortinet FortiSIEM 2nd Order Command Injection Deep
29
May
2024

PoC Exploit Released for Critical Fortinet FortiSIEM

A proof-of-concept (PoC) exploit has been released for a critical vulnerability in Fortinet’s FortiSIEM. The vulnerability, CVE-2024-23108, allows for remote,…

UAC Bypass: 3 Methods Used Malware In Windows 11 in 2024
28
May
2024

3 Methods Used Malware In Windows 11 in 2024

User Account Control (UAC) is one of the security measures introduced by Microsoft to prevent malicious software from executing without…

Critical Vulnerability In AI-As-A-Service Provider Let Attackers Access Sensitive Data
28
May
2024

Critical Vulnerability In AI-As-A-Service Provider

A critical vulnerability was found in the Replicate AI platform that could have exposed the private AI models and application…

TP-Link Archer C5400X Router Flaw Let Attacker Hack Devices Remotely
28
May
2024

TP-Link Archer C5400X Router Flaw Let Attacker Hack Devices

Hackers often target routers as the gateways that connect devices and networks to the internet. Besides this, they are lucrative…

How All-in-One Cybersecurity Platform Cynet Makes MSPs Rich & Their Clients Secure
28
May
2024

How Cynet Makes MSPs Rich & Their Clients Secure

Managed service providers (MSPs) are on the front lines of soaring demand for cybersecurity services as cyberattacks increase in volume…

Spyware Website Leaking People’s Phones Real-Time Screenshots Online
28
May
2024

Spyware Website Leaking People’s Phones Real-Time Screenshots Online

A stalkerware company with poor security practices is exposing victims’ data as the software, designed for unauthorized device monitoring, leaked…

WAF Bypass Using Burp Plugin
28
May
2024

Researchers Detailed WAF Bypass Techniques With Burp Plugin

Security experts have disclosed advanced methods for bypassing Web Application Firewalls (WAFs) on a large scale, and they have also…

Zscaler Client Connector Zero-interaction Privilege Escalation Vulnerability
28
May
2024

Zscaler Client Connector Zero-interaction Privilege Escalation Vulnerability

A new privilege escalation vulnerability has been discovered in Zscaler Client Connector, combining three different vulnerabilities. The three vulnerabilities were…

Sav-Rx Discloses Data Breach: 2.8 Million Users Affected
28
May
2024

Sav-Rx Discloses Data Breach: 2.8 Million Users Affected

Sav-Rx, a healthcare company based in Fremont, Nebraska, has disclosed a major data breach affecting over 2.8 million individuals, including…

Hackers Exploiting Arc Browser Popularity with Malicious Google Search Ads
28
May
2024

Hackers Exploiting Arc Browser Popularity with Malicious Ads

Google Chrome has been the dominant web browser for years now, which is why it may come as a surprise…

Threats Claimimg Breach of Decathlon May 2024 Database
28
May
2024

Threats Claimimg Breach of Decathlon May 2024 Database

It has been reported that a well-known threat actor named “888” has purportedly exposed a database linked to the well-liked…