Category: CyberSecurityNews

Benefits of a vCISO for Small Businesses
12
Feb
2024

Benefits of a vCISO for Small Businesses

Cybersecurity is of critical concern for every company, no matter their headcount or yearly revenue; in fact, many hackers target…

Rise of Black Hat AI Tools That Shifts The Nature Of Cyber Warfare
12
Feb
2024

Rise of Black Hat AI Tools That Shifts The Nature Of Cyber Warfare

The rise of malicious versions of LLMs, like dark variants of ChatGPT, is escalating cyber warfare by enabling more sophisticated…

Zardoor Malware Uses Reverse Proxy Tools to Evade Detection
12
Feb
2024

Zardoor Malware Uses Reverse Proxy Tools to Evade Detection

A new malware has been reported to be distributed by threat actors, which is likely known to be a stealthy…

Fortinet Warns of Critical SSL VPN Flaw Exploited in the Wild
09
Feb
2024

Fortinet Warns of Critical SSL VPN Flaw Exploited in the Wild

Fortinet has issued a warning regarding a critical out-of-bounds write vulnerability in FortiOS.  Remote attackers can exploit this vulnerability to…

Beware of Fake LastPass App that Steal Personal Information
09
Feb
2024

Beware of Fake LastPass App that Steal Personal Information

Customers of LastPass have been alerted of a fraudulent app on the Apple App Store that poses as the legitimate LastPass…

Chinese Hackers Remain Undetected in US Infrastructure
09
Feb
2024

Chinese Hackers Remain Undetected in US Infrastructure

Volt Typhoon, the PRC state-sponsored threat actor, has been discovered to be compromising U.S. critical infrastructure for future crises in…

Ransomware Payments Hitting Record High, Exceed $1 Billion
09
Feb
2024

Ransomware Payments Hitting Record High, Exceed $1 Billion

Chainalysis, a leading blockchain analysis firm, has recently released a report on ransomware payments revealing that they have skyrocketed to…

ANY.RUN Sandbox Now Analyzes Complex Linux Malware
08
Feb
2024

ANY.RUN Sandbox Now Analyzes Complex Linux Malware

The ANY.RUN sandbox has recently undergone an update to include support for Linux, strengthening its capacity to offer a safe…

Spyware Vendors Behind 50% 0-day Exploits: Google Said
08
Feb
2024

Spyware Vendors Behind 50% 0-day Exploits: Google Said

Spyware is a crucial tool for the surveillance and data collection of high-risk individuals. The functionalities of spyware have undergone…

Linux Shim Bootloader Flaw Expose Most Linux Distros to Attacks
07
Feb
2024

Linux Shim Bootloader Flaw Expose Most Linux Distros to Attacks

Shim is a small application used by open-source projects and other third parties for verifying and running the bootloader (typically…

Chinese Hackers Exploited Fortinet zero-day Flaw to hack networks
07
Feb
2024

Chinese Hackers Exploited Fortinet zero-day Flaw to hack networks

Chinese state-sponsored hackers exploited a zero-day vulnerability (CVE-2022-42475) in Fortinet’s virtual private network to gain unauthorized access to the Dutch…

Two New FortiSIEM Max-severity Flaw Execute Remote Code
07
Feb
2024

Two New FortiSIEM Max-severity Flaw Execute Remote Code

FortiSIEM has been discovered with multiple OS command injection vulnerabilities, which could allow an unauthenticated remote threat actor to execute…