Category: CyberSecurityNews

Iranian Mint Sandstorm Attacking Researchers With Hacking Tools
18
Jan
2024

Iranian Mint Sandstorm Attacking Researchers With Hacking Tools

Hackers frequently target researchers to get illegal access to important research data, intellectual property, and highly sensitive information. The threat…

Opera Bug Hackers Run ANY File on Mac or Windows
18
Jan
2024

Opera Bug Hackers Run ANY File on Mac or Windows

Hackers exploit Remote Code Execution (RCE) vulnerabilities as they allow them to execute arbitrary code on a target system remotely….

Google Chrome Browser Zero-Day Vulnerability Exploited in Wild
17
Jan
2024

Google Chrome Browser Zero-Day Vulnerability Exploited in Wild

Google Chrome released the first security update in 2024 with a fix for the zero-day bug actively exploited in Wild….

178,000+ Sonicwall Firewalls Vulnerable to RCE Attacks
17
Jan
2024

178,000+ Sonicwall Firewalls Vulnerable to RCE Attacks

Due to Sonicwall Firewalls’ widespread usage in organizations, hackers find them to be appealing targets when looking to breach networks….

Hackers Exploiting Windows Defender SmartScreen Flaw
16
Jan
2024

Hackers Exploiting Windows Defender SmartScreen Flaw

Hackers actively target and exploit Windows Defender SmartScreen to deceive users and deliver malicious content by creating convincing, misleading websites…

Framework Hacked - Hackers Compromised The Network Using Phishing Email 
16
Jan
2024

Framework Hacked – Hackers Compromised The Network Using Phishing Email 

Recently, Framework’s primary external accounting partner, Keating Consulting, discovered at 8:13 am PST on January 11th, 2024, that the network…

Living-off-Trusted-Sites (LOTS) - APT Hackers Abusing GitHub
15
Jan
2024

Living-off-Trusted-Sites (LOTS) – APT Hackers Abusing GitHub

Hackers use GitHub to access and manipulate source code repositories. GitHub hosts open-source projects, and unauthorized access allows hackers to…

Babuk Ransomware Decryptor Updated to Recover Files Infected
13
Jan
2024

Babuk Ransomware Decryptor Updated to Recover Files Infected

Hackers use ransomware to encrypt victims’ files and render them inaccessible until a ransom is paid. This forces the victims…

Hackers Impersonate as Security Researcher Aid Ransom Victims
12
Jan
2024

Hackers Impersonate as Security Researcher Aid Ransom Victims

Hackers impersonate security researchers to exploit trust and credibility. By posing as legitimate figures in the cybersecurity community, they: Gain…

Hacker from ShinyHunters Group Arrested for Breaching Company
12
Jan
2024

Hacker from ShinyHunters Group Arrested for Breaching Company

A 22-year-old French citizen, Sebastian Raoult, has been sentenced to three years in prison and ordered to pay over $5…

Microsoft Patch Tuesday 2024: 49 Vulnerabilities are fixed
12
Jan
2024

Microsoft Patch Tuesday 2024: 49 Vulnerabilities are fixed

Microsoft released its first patch on Tuesday, 2024, in which nearly 49 vulnerabilities have been fixed in Microsoft products and…

Critical Cisco Unity Connection Flaw Let Attackers Run Command
11
Jan
2024

Critical Cisco Unity Connection Flaw Let Attackers Run Command

A critical vulnerability of severe severity has been found in Cisco Unity Connection’s web-based management interface. This flaw might allow…