Category: CyberSecurityNews

LockBit Ransomware Gang Claims Cyber Attack on Subway
24
Jan
2024

LockBit Ransomware Gang Claims Cyber Attack on Subway

An infamous cybercriminal group known as LockBit Ransomware recently targeted Subway’s food chain, unleashing a vicious attack that could potentially…

Re-vamped Zloader Attacking Windows Users With RSA Encryption
24
Jan
2024

Re-vamped Zloader Attacking Windows Users With RSA Encryption

Zloader, also known as Terdot, DELoader, or Silent Night, is a modular trojan that reappeared after nearly two years of absence…

ThreeAM Ransomware Attacking Small & Medium Companies
24
Jan
2024

ThreeAM Ransomware Attacking Small & Medium Companies

For financial gain, hackers exploit ransomware through which they encrypt victims’ data and then demand a ransom payment in exchange…

Apple Critical Zero-day Flaw Exposes iPhones & Macs
23
Jan
2024

Apple Critical Zero-day Flaw Exposes iPhones & Macs

Apple has released its first zero-day vulnerability patch of 2024, which affected several Apple products, including tvOS, iOS, iPadOS, macOS,…

Atlassian Confluence Servers Attacked From 600+ IPs
23
Jan
2024

Atlassian Confluence Servers Attacked From 600+ IPs

Atlassian disclosed a critical vulnerability last week related to Remote Code Execution (CVE-2023-22527). This particular vulnerability was reported to be…

What is Infrastructure as Code Security (IaC)?
23
Jan
2024

What is Infrastructure as Code Security (IaC)?

Infrastructure as Code (IaC) is a popular DevOps practice that manages and provides IT infrastructure through code rather than manual…

Critical AI Security Flaws Attackers Bypass Detection & Execute RC
23
Jan
2024

Critical AI Security Flaws Attackers Bypass Detection & Execute RC

Artificial Intelligence (AI) has become one of the fastest-booming technologies of this decade, with several advancements in multiple industries. In…

WhatsApp Privacy Flaw Devices Information to Any Other User
23
Jan
2024

WhatsApp Privacy Flaw Devices Information to Any Other User

Hackers seek to exploit WhatsApp flaws to gain unauthorized access to user data, messages, and sensitive information.  Exploiting these flaws…

Deloitte and Memcyco Collaborate on Real-Time Digital Impersonation Protection for ATO and Other Online Attacks
22
Jan
2024

Deloitte and Memcyco Collaborate on Real-Time Digital Impersonation Protection for ATO and Other Online Attacks

Memcyco will showcase its solutions at Deloitte’s annual Cyber iCON event, demonstrating how organizations can build effective defenses to protect…

What is QR Code Phishing (Quishing) ?
22
Jan
2024

What is QR Code Phishing (Quishing) ?

QR code Phishing, or “Quishing,” is a cyber threat that exploits the widespread use of QR (Quick Response) codes in…

Microsoft Senior Executives Emails Hacked by Russian Hackers
22
Jan
2024

Microsoft Senior Executives Emails Hacked by Russian Hackers

Hackers often target email accounts to gain unauthorized access to sensitive information. After gaining unauthorized access, they conduct several illicit…

Chinese Hackers Exploiting VMware ESXi Zero-day Since 2021
22
Jan
2024

Chinese Hackers Exploiting VMware ESXi Zero-day Since 2021

In Late 2023, UNC3886, a highly advanced Chinese nexus espionage group, was found to be exploiting VMware vCenter systems using…