Category: CyberSecurityNews

Google Launches AI Powered Malicious File Detection Tool Magika
19
Feb
2024

Google Launches AI Powered Malicious File Detection Tool Magika

Google has introduced Magika, an AI-powered file-type identification system that assists in detecting binary and textual file formats. Even when utilizing…

State-Sponsored Hackers Employ ChatGPT Cybercrime Schemes
19
Feb
2024

State-Sponsored Hackers Employ ChatGPT Cybercrime Schemes

Advanced Persistent Threat (APT) groups have been adopting and leveraging Artificial Intelligence (AI) to enhance their productivity and evade security…

GL-AX1800 Router Vulnerability Let Attackers Execute Remote Code
19
Feb
2024

GL-AX1800 Router Vulnerability Let Attackers Execute Remote Code

A recent analysis of the GL-AX1800 router by researchers revealed the presence of several security vulnerabilities that attackers could exploit…

LabHost Employs Phishing-as-a-Service Steal Banking Credentials
19
Feb
2024

LabHost Employs Phishing-as-a-Service Steal Banking Credentials

LabHost group has been discovered to be targeting Canadian Banks with Phishing-as-a-service attacks. Phishing-as-a-service (PhaaS) groups have been on the…

Cisco To Lay Off 4,000+ Employees Which is 5% of Workforce
19
Feb
2024

Cisco To Lay Off 4,000+ Employees Which is 5% of Workforce

A company may lay off employees due to various reasons like changes in market conditions, shifts in business strategy, cost-cutting…

How to Interpret the MITRE Engenuity ATT&CK® Evaluations
16
Feb
2024

How to Interpret the MITRE Engenuity ATT&CK® Evaluations

Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…

U.S. State Government Network Hacked Via Former Employee Account
16
Feb
2024

U.S. State Government Network Hacked Via Former Employee Account

CISA (Cybersecurity and Infrastructure Security Agency) and MS-ISAC (Multi-State Information Sharing and Analysis Center) have jointly disclosed that an unknown…

RansomHouse Automated Attacks Using Tool Dubbed MrAgent
16
Feb
2024

RansomHouse Automated Attacks Using Tool Dubbed MrAgent

The RansomHouse group recognized as a Ransomware-as-a-Service (RaaS), surfaced in the latter part of 2021 and has been actively utilizing…

New Wi-Fi Auth Bypass Flaw Exposes Home & Enterprise Attacks
16
Feb
2024

New Wi-Fi Auth Bypass Flaw Exposes Home & Enterprise Attacks

Security researchers Mathy Vanhoef and Héloïse Gollier, have recently uncovered several critical vulnerabilities in the Wi-Fi authentication protocols used in…

What is .NET Malware Obfuscators?
15
Feb
2024

What is .NET Malware Obfuscators?

The .NET malware obfuscators are tools used to obfuscate the source code of .NET applications, making it challenging for reverse…

Zoom Desktop Flaws Let Attackers Launch Privilege Escalation Attacks
15
Feb
2024

Zoom Desktop Flaws Let Attackers Launch Privilege Escalation Attacks

Zoom, a well-known video conferencing software, has patched seven vulnerabilities in its desktop and mobile applications, particularly a critical flaw identified…

Wireshark 4.2.3 Released: What’s New!
15
Feb
2024

Wireshark 4.2.3 Released: What’s New!

Wireshark, the most popular network protocol analyzer worldwide, has released version 4.2.3, which includes new features and upgrades. Wireshark, a…