Category: CyberSecurityNews

New Attack Steals Sensitive Data From Modern Processors
30
Apr
2024

New Attack Steals Sensitive Data From Modern Processors

Microarchitectural side-channel attacks misuse shared processor state to transmit information between security domains.  Although they can be used in isolation,…

Muddling Meerkat Using DNS As A Powerful Weapon
30
Apr
2024

Muddling Meerkat Using DNS As A Powerful Weapon

Hackers exploit DNS vulnerabilities to redirect users to malicious websites, launch distributed denial-of-service (DDoS) attacks by overwhelming DNS servers, and…

Beware of New Android Trojan That Executes Malicious Commands on Your Phone
30
Apr
2024

Beware of New Android Trojan That Executes Malicious Commands

Cybersecurity researchers at XLab have uncovered a new Android malware strain called “Wpeeper.” This sophisticated backdoor Trojan has been designed…

Authorities Seized Platform Used For Paid DDoS
30
Apr
2024

Authorities Seized Platform Used For Paid DDoS

On April 17, 2024, a joint effort between the Dresden Public Prosecutor’s Office and the Cybercrime Competence Center of the…

Safari is Not So Private! Safari Flaw Exposing EU iPhone Users to Trackers
30
Apr
2024

Safari Flaw Exposing EU iPhone Users to Trackers

A significant security flaw has been identified in Apple’s Safari browser that could potentially expose iPhone users in the European…

Ex-Infosec Designer Sentenced to Over 21 Years in Prison
30
Apr
2024

Ex-Infosec Designer Sentenced to Over 21 Years in Prison

Jareh Sebastian Dalke, 32, of Colorado Springs, was sentenced today to 262 months in prison for attempted espionage in connection…

Linux Kernel Vulnerability (CVE-2024-26925) Let Hackers Access Unauthorized Data
30
Apr
2024

Linux Kernel Vulnerability Let Hackers Access unauthorized Data

In a significant update from the Linux kernel’s security team, a critical vulnerability identified as CVE-2024-26925 has been addressed to…

Empty S3 Bucket
30
Apr
2024

How an Empty S3 Bucket Led to a Massive AWS Bill

AWS Customer Faces Massive Bill Due to Open-Source Tool Misconfiguration. In a startling incident, an AWS customer faced a staggering…

Gemini 1.5 Pro – Powered With Automated Malware Analysis To Detect Zero-Day
30
Apr
2024

Gemini 1.5 Pro For Malware Analysis to Detect Zero-day Malware

Google has introduced Gemini 1.5 Pro for malware analysis, an advanced AI tool capable of processing up to 1 million…

Token Infrastructure Platform Hacked: .5 Million Stolen in Cryptos
29
Apr
2024

$44.5 Million Stolen in Cryptos

Hedgey Finance, a prominent token infrastructure platform, has reported a massive theft of approximately $44.5 million in cryptocurrencies. This incident…

A New Sophisticated Technique Evades EDR
29
Apr
2024

A New Sophisticated Technique Evades EDR

In the rapidly evolving, complex threat landscape, EDR companies are constantly racing against new vectors. Recently, Helvio Benedito Dias de…

Judge0 Security Vulnerabilities Let Attackers Run Arbitrary Code & Gain Root Access
29
Apr
2024

Judge0 Security Vulnerabilities Let Attackers Run Arbitrary Code

Tanto Security has disclosed critical vulnerabilities in the widely-used open-source service Judge0, which could allow attackers to perform a sandbox…