Category: CyberSecurityNews

CISA Reveals Guidance For Implementation of Encrypted DNS Protocols
17
May
2024

CISA Reveals Guidance – Encrypted DNS Protocols

“Encrypted DNS Implementation Guidance,” a detailed document from the Cybersecurity and Infrastructure Security Agency (CISA), tells government agencies how to…

Multi-Factor Authentication for Azure Users
17
May
2024

Microsoft to Mandate Multi-Factor Authentication for All Azure Users

Microsoft has said that all Azure users will have to use multi-factor authentication (MFA) starting in July. This is a…

Darkgate Malware Weaponized XLSX, HTML &PDF To Attack Windows
17
May
2024

Darkgate Malware Weaponized XLSX, HTML &PDF To Attack Windows

Hackers often target XLSX, HTML, and PDF files as they are widely used, and their trustable file formats also attract…

LogRhythm and Exabeam to Merge to Boost SIEM & SOAR
16
May
2024

LogRhythm and Exabeam to Merge to Boost SIEM & SOAR

LogRhythm and Exabeam, two leading cybersecurity companies, announced today their intent to merge in a transformative deal that will create…

Apple Safari Zero-Day Flaw Exploited At Pwn2Own : Patch Now
16
May
2024

Apple Safari Zero-Day Flaw Exploited At Pwn2Own : Patch Now

Apple has released security updates to address a zero-day vulnerability in its Safari web browser that was exploited during this…

PoC Exploit Released for Ivanti EPMM MobileIron Core
16
May
2024

PoC Exploit Released for Ivanti EPMM MobileIron Core

A newly disclosed vulnerability, CVE-2024-22026, has been found in Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core. This vulnerability allows…

Hackers Exploiting Quick Assist Tool To Deliver Ransomware
16
May
2024

Hackers Exploiting Quick Assist Tool To Deliver Ransomware

Hackers often target remote assist tools because they create a direct channel to access desired systems with minimum effort.  These…

Earth Hundun Hacker Group Employs Advanced Tactics to Evade Detection
16
May
2024

Earth Hundun Hacker Group Employs Advanced Tactics

Earth Hundun, a notable Asia-Pacific malware organization, uses Waterbear and Deuterbear. We first encountered Deuterbear in Earth Hundun’s arsenal in…

Palo Alto Networks Buys IBM’s QRadar
16
May
2024

Palo Alto Networks Buys IBM’s QRadar

Palo Alto Networks has made a significant decision to enhance its cloud security services by acquiring IBM’s QRadar cloud security…

Authorities Seized Notorious Data Leak Site BreachForums
16
May
2024

Authorities Seized Notorious Data Leak Site BreachForums

The notorious data leak site BreachForums has been taken over by the police. Cybercrime and data leaks are still being…

Critical SAP NetWeaver & CX Commerce
16
May
2024

Critical SAP NetWeaver AND CX Commerce Flaw Leads To Complete Takeover

Three vulnerabilities associated with CSS injection, file upload, and remote code execution have been discovered in the SAP Customer Experience…

Wireshark 4.2.5
16
May
2024

Wireshark 4.2.5 Released – What’s New!

The Wireshark team has announced the release of Wireshark 4.2.5, a maintenance update to the popular network protocol analyzer. This…