Category: CyberSecurityNews

Broadcom Merges Carbon Black with Symantec Focusing Security
12
Mar
2024

Broadcom Merges Carbon Black with Symantec Focusing Security

Broadcom has taken a step by merging Carbon Black and Symantec, two of the most innovative and engineering-driven brands in…

Researchers Hacked Google A.I: Earned $50k Bounty
12
Mar
2024

Researchers Hacked Google A.I: Earned $50k Bounty

At Google’s LLM bugSWAT event in Las Vegas, researchers uncovered and reported bugs in the company’s Bard AI (formerly known…

Hackers Compromised 3,300 Websites using Plug-in Vulnerability
12
Mar
2024

Hackers Compromised 3,300 Websites using Plug-in Vulnerability

Attackers exploit an unpatched Popup Builder vulnerability (CVE-2023-6000) to inject malicious code into vulnerable websites’ “Custom JS or CSS” sections. …

Addressing Emerging Threats Through Adaptive Software Development
11
Mar
2024

Addressing Emerging Threats Through Adaptive Software Development

In today’s interconnected world, the threat landscape of cybersecurity is more dynamic and sophisticated than ever. Organizations face an array…

Hackers Using Weaponized ISO & IMG Files to Attack Organizations
11
Mar
2024

Hackers Using Weaponized ISO & IMG Files to Attack Organizations

The notorious hacking group known as Earth Kapre, also referred to as RedCurl and Red Wolf, has been targeting organizations…

BianLian Hackers Exploiting TeamCity servers to Deploy
11
Mar
2024

BianLian Hackers Exploiting TeamCity servers to Deploy

The notorious hacking group BianLian, known for its sophisticated cyber attacks, has shifted its focus to extortion-only operations following the…

Vulnerabilities in Fonts Allow XXE & Arbitrary Command Execution
11
Mar
2024

Vulnerabilities in Fonts Allow XXE & Arbitrary Command Execution

The popular fonts used in web development and design can be exploited to launch XML External Entity (XXE) attacks and…

Beware of Fake Trading Apps on Google Play & App Store
11
Mar
2024

Beware of Fake Trading Apps on Google Play & App Store

A recent investigation unveiled a trend of fake trading apps on Google Play and the App Store designed to trick…

Magnet Goblin Hackers Exploiting 1-day Vulnerabilities Linux Servers
11
Mar
2024

Magnet Goblin Hackers Exploiting 1-day Vulnerabilities Linux Servers

Threat actors often target Linux servers due to their widespread use in critical infrastructure, web hosting, and cloud environments.  The…

Top 10 Cloud Security Mitigation Strategies
11
Mar
2024

Top 10 Cloud Security Mitigation Strategies

NSA and CISA jointly released “Top 10 Cloud Security Mitigation Strategies” to advise cloud users on critical security practices for…

Malware Families Adapting To COM Hijacking Technique For Persistence
11
Mar
2024

Malware Families Adapting To COM Hijacking Technique For Persistence

COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding…

150K+ Fortinet Devices Vulnerable to Critical Code Execution Flaw
10
Mar
2024

150K+ Fortinet Devices Vulnerable to Critical Code Execution Flaw

A critical security flaw identified as CVE-2024-21762 has been discovered in Fortinet’s FortiOS and FortiProxy secure web gateway systems, potentially…