Category: CyberSecurityNews

Researchers Hunted Malicious Stockpiled Domains DNS Records
04
Jan
2024

Researchers Hunted Malicious Stockpiled Domains DNS Records

Malicious stockpiled domains are the collection of domain names that threat actors acquire in advance for several types of future…

Automated Analysis of kernel to Detect Vulnerabilities
03
Jan
2024

Automated Analysis of kernel to Detect Vulnerabilities

Kernel vulnerabilities are prevalent in operating systems and can affect billions of devices. One of the most widely used tools…

Google pays $5 Billion to End 'private mode' Tracking Lawsuit
02
Jan
2024

Google pays $5 Billion to End ‘private mode’ Tracking Lawsuit

A landmark settlement has been reached in a class-action lawsuit against Google, accusing the tech giant of breaching user privacy…

5 Best Bug Bounty Platforms For Hackers
02
Jan
2024

5 Best Bug Bounty Platforms For Hackers

Bug bounty platforms play a crucial role in the cybersecurity ecosystem by enabling organizations to leverage the expertise of external…

Top 10 Notorious Ransomware Gangs of 2023
02
Jan
2024

Top 10 Notorious Ransomware Gangs of 2023

By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving…

Microsoft Disabled App Installer Abused by Hackers
02
Jan
2024

Microsoft Disabled App Installer Abused by Hackers

Threat actors, particularly those with financial motivations, have been observed spreading malware via the ms-appinstaller URI scheme (App Installer). As…

Palo Alto Networks Completes Acquisition of Talon Cyber Security
29
Dec
2023

Palo Alto Networks Completes Acquisition of Talon Cyber Security

Palo Alto Networks (PANW), the cybersecurity juggernaut, has officially acquired Talon Cyber Security, a pioneer in enterprise browser technology.  This…

10 Most Notable Cyber Attacks of 2023
29
Dec
2023

10 Most Notable Cyber Attacks of 2023

In recent times, due to rapid advancements in technology, increased connectivity, and sophisticated tactics that threat actors use, cyber attacks…

Kimsuky Group Using Weaponized file Deploy AppleSeed Malware
28
Dec
2023

Kimsuky Group Using Weaponized file Deploy AppleSeed Malware

Hackers use weaponized LNK files to exploit vulnerabilities in Windows operating systems. These files often contain malicious code that can…

Over 95 GB of data Leaked
28
Dec
2023

Over 95 GB of data Leaked

The biggest producer of probiotic drinks in the world, Yakult, was the target of a significant that exposed private data…

Hackers' Leaksmas Darkweb Event Exposes Massive Hacked Data
28
Dec
2023

Hackers’ Leaksmas Darkweb Event Exposes Massive Hacked Data

As carols resonated in the air and families convened, the cyber underworld ushered in a chilling twist to Christmas –…

Top 10 Most Exploited Vulnerabilities of 2023
28
Dec
2023

Top 10 Most Exploited Vulnerabilities of 2023

Several vulnerabilities have been identified and exploited by threat actors in the wild this year for several malicious purposes, such…