Category: CyberSecurityNews

Court Charges Programmer for Disclosing Security Flaw Publicly
22
Jan
2024

Court Charges Programmer for Disclosing Security Flaw Publicly

In a case that ignites the age-old debate between security concerns and ethical hacking, a German court has convicted a…

Bluetooth Flaw Let Hackers Takeover of iOS & Android Devices
21
Jan
2024

Bluetooth Flaw Let Hackers Takeover of iOS & Android Devices

Bluetooth vulnerabilities in Android, Linux, macOS, iOS, and Windows are critical as hackers could exploit them to gain unauthorized access…

1,718,000+ Apache Struts 2 Installation Open to RCE Attacks
20
Jan
2024

1,718,000+ Apache Struts 2 Installation Open to RCE Attacks

Threat actors target Apache Struts 2 due to vulnerabilities in its code that can be exploited for unauthorized access to…

Hackers Abuse TeamViewer to Launch Ransomware Attacks
19
Jan
2024

Hackers Abuse TeamViewer to Launch Ransomware Attacks

Hackers exploit TeamViewer because it gives remote access to systems and allows threat actors to control them. This can be…

Hackers Attack Thousands of Users With Fake iCloud Storage Alert
19
Jan
2024

Hackers Attack Thousands of Users With Fake iCloud Storage Alert

Since Apple iCloud saves sensitive and personal data like images, emails, and documents, hackers often target Apple iCloud. Breaching iCloud…

The Security Dimensions of Adopting Large Language Models
19
Jan
2024

The Security Dimensions of Adopting Large Language Models

The incredible capabilities of LLM (Large Language Models) enable organizations to engage in various useful activities such as generating branding…

Pure Malware Tools Masquerade as Legitimate Software
19
Jan
2024

Pure Malware Tools Masquerade as Legitimate Software

Recently, security analysts at ANY.RUN discovered that the Pure malware tools are masquerading as legitimate software to evade detection. ANY.RUN…

APT group Exploit Ivanti Connect Secure VPN New Zero-Day Flaw
19
Jan
2024

APT group Exploit Ivanti Connect Secure VPN New Zero-Day Flaw

Hackers exploit Zero-Day flaws in VPNs as these vulnerabilities are unknown to the software vendor, making them difficult to patch…

LeftoverLocals Attack Steal AI Data From Apple, Qualcomm & AMD
18
Jan
2024

LeftoverLocals Attack Steal AI Data From Apple, Qualcomm & AMD

An attacker may be able to steal a significant amount of data from a GPU’s memory due to a flaw…

New iShutdown Enables Detection of Spyware On iPhones
18
Jan
2024

New iShutdown Enables Detection of Spyware On iPhones

Malware hunting on iOS devices has been extremely difficult due to the nature of the iOS ecosystem. There were only…

Malware Trends 2024 - Top Malware Families and Types
18
Jan
2024

Malware Trends 2024 – Top Malware Families and Types

As the new year kicks off, it’s time to take a retrospective look at the past year’s malware landscape. Let’s…

Iranian Mint Sandstorm Attacking Researchers With Hacking Tools
18
Jan
2024

Iranian Mint Sandstorm Attacking Researchers With Hacking Tools

Hackers frequently target researchers to get illegal access to important research data, intellectual property, and highly sensitive information. The threat…