Category: CyberSecurityNews

CrowdStrike Publishes Technical Root Cause Analysis of Faulty Falcon Update
07
Aug
2024

CrowdStrike Publishes Technical Root Cause Analysis of Faulty Falcon Update

Cybersecurity giant CrowdStrike has released a comprehensive technical root cause analysis detailing the events that led to a problematic Falcon…

SbaProxy
06
Aug
2024

Hackers Hijack Anti-Virus Software Using SbaProxy Hacking Tool

Researchers from LevelBlue Labs have uncovered a new tactic threat actors employ to hijack legitimate anti-virus software for malicious purposes….

Samsung Announces  Million Rewards for Arbitrary Code Execution Vulnerabilities
06
Aug
2024

Samsung Announces $1 Million Rewards for Arbitrary Code Execution Vulnerabilities

Samsung has significantly increased its bug bounty program as part of its ongoing efforts to enhance mobile security. The tech…

Western Digital’s WD Discovery App Flaw Allows Code Execution
06
Aug
2024

Western Digital’s Discovery App Vulnerability Allows Code Execution

The Western Digital Discovery app, a well-known provider of storage devices, has a vulnerability identified as CVE 2024-22169 with a…

Network Admins Beware! SharpRhino Ransomware Attacking Mimic as Angry IP Scanner
06
Aug
2024

Network Admins Beware! SharpRhino Ransomware Attacking Mimic as Angry IP Scanner

Hunters International has deployed a novel C# malware dubbed SharpRhino as an initial infection vector and persistent Remote Access Trojan…

Google Patches Actively Exploited Android Kernel Zero-Day Patched
06
Aug
2024

Google Patches Actively Exploited Android Kernel Zero-Day Patched

The Android Security Bulletin for August 2024 details vulnerabilities addressed by the 2024-08-05 security patch level.  The most critical issue…

Detects Threats in Serverless Cloud
06
Aug
2024

New Threat Detection Model Detects Threats in Serverless Cloud

Researchers have introduced a novel threat detection model designed specifically for serverless cloud environments. This innovative approach leverages cloud providers’…

Jfrog Artifactory Flaw Let Attackers Poison Artifact Caches
06
Aug
2024

Jfrog Artifactory Flaw Let Attackers Poison Artifact Caches

A critical vulnerability identified as CVE-2024-6915 has been discovered in JFrog Artifactory, a widely used repository manager. This flaw, categorized…

Apache OFBiz Zero-Day Vulnerability Let Attackers Execute Remote Code
06
Aug
2024

Apache OFBiz Zero-Day Vulnerability Let Attackers Execute Remote Code

A critical zero-day vulnerability in Apache OFBiz, an open-source enterprise resource planning (ERP) system, has been discovered that could allow…

Bloody Wolf Attacking Organizations
05
Aug
2024

Bloody Wolf Attacking Organizations With $80 Malware From Underground Market

Cybersecurity experts have uncovered a series of attacks targeting organizations in Kazakhstan by a threat actor dubbed “Bloody Wolf.” The…

Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems
05
Aug
2024

Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems

A critical security flaw in Windows’ wallpaper handling mechanism has been uncovered. It allows attackers to gain system-level privileges on…

APT41 Hackers Attacking Research Institute with ShadowPad and Cobalt Strike
05
Aug
2024

APT41 Attacking Research Institute with ShadowPad & Cobalt Strike

Cisco Talos has unearthed a sophisticated cyber-espionage campaign targeting a Taiwanese government-affiliated research institute. The attack, attributed to the notorious…