Category: CyberSecurityNews

Russian APT28 Hackers Exploiting Windows Print Spooler
23
Apr
2024

Russian APT28 Hackers Exploiting Windows Print Spooler

Hackers abuse Windows Print Spooler vulnerabilities because it runs with elevated SYSTEM privileges, allowing privilege escalation.  Also, exploiting it enables…

Forminator WordPress Plugin Flaw Exposes Over 50,000 Websites to Cyber Attacks
23
Apr
2024

Forminator WordPress Plugin Flaw Exposes Over 50k Websites

In a recent cybersecurity revelation, over 50,000 websites using the popular WordPress plugin Forminator are at risk due to multiple…

WordPress Responsive theme Flaw Let Attackers Inject Malicious HTML Scripts
23
Apr
2024

WordPress Responsive Flaw – Attackers Inject Malicious HTML

A vulnerability was identified in the WordPress theme, “Responsive,” allowing attackers to inject arbitrary HTML content into websites. This flaw,…

New Flexible Kapeka Backdoor With Attacking Capabilities
22
Apr
2024

New Flexible Kapeka Backdoor With Attacking Capabilities

A new backdoor named “Kapeka” has been identified to be attacking victims in Eastern Europe since mid-2022. Kapeka is a…

ToddyCat APT Hackers Deploy Multiple Tools to Hijack Network Infrastructure
22
Apr
2024

ToddyCat APT Hackers Deploy Multiple Tools to Hijack Network

Advanced Persistent Threat (APT) group known as ToddyCat, new insights have emerged regarding their sophisticated methods of hijacking network infrastructure to steal sensitive data from governmental organizations across the Asia-Pacific region. This…

GPT-4 Is Capable Of Exploiting 87% Of One-Day Vulnerabilities
22
Apr
2024

GPT-4 Is Capable Of Exploiting 87% Of One-Day Vulnerabilities

Large language models (LLMs) have achieved superhuman performance on many benchmarks, leading to a surge of interest in LLM agents…

48 Vulnerabilities Uncovered In AI systems : Surge By 220%
22
Apr
2024

48 Vulnerabilities Uncovered In AI systems : Surge By 220%

Since the initial disclosure of 15 vulnerabilities in November 2023, a 220% increase in vulnerabilities impacting AI systems has been…

Lambda Layers Code Execution Flaw Leads To Supply Chain On AI/ML Applications
22
Apr
2024

Lambda Layers Code Execution Flaw Leads To Supply Chain On AI/ML Applications

A new supply-chain vulnerability has been identified in the Lambda Layers of third-party TensorFlow-based Keras models. This vulnerability could allow…

TransparentTribe Hackers Weaponize Websites & Documents to Attack Indian Orgs
22
Apr
2024

TransparentTribe Hackers Weaponize Websites & Documents

The hacker group known as TransparentTribe, also referred to as APT-36, has intensified its cyber espionage activities. This group, originating…

Hackers Mimic Road Toll Collection Services to Steal Your Money
22
Apr
2024

Hackers Mimic Road Toll Collection Services to Steal Your Money

The FBI’s Internet Crime Complaint Center (IC3) has warned about a sophisticated smishing scam targeting drivers across multiple states. Since…

Hackers Offering Admin Access to 3000 Fortinet SSl-VPN
22
Apr
2024

Hackers Offering Admin Access to 3000 Fortinet SSl-VPN

Hackers are now offering administrative access to over 3000 Fortinet SSL-VPN devices. This breach poses a significant threat to the…

Citrix UberAgent Vulnerability Allows Attackers To Escalate Privileges
22
Apr
2024

Citrix UberAgent Vulnerability Allows Privilege Escalation

Citrix’s uberAgent, a sophisticated monitoring tool used to enhance performance and security across Citrix platforms, has been identified as having…