Category: CyberSecurityNews

Multiple Flaws in Dell PowerProtect Products Execute Commands
15
Dec
2023

Multiple Flaws in Dell PowerProtect Products Execute Commands

Multiple vulnerabilities have been discovered in Dell’s PowerProtect, which were associated with SQL injection, cross-site scripting (XSS), privilege escalation, command…

New Hacker Group Uses SQL Injection to Hack Companies
15
Dec
2023

New Hacker Group Uses SQL Injection to Hack Companies

A new threat actor has been discovered to be using SQL injection attacks to gain unauthorized access to organizations in…

New Dark Web Market OLVX Advertising Variety of Hacking Tools 
14
Dec
2023

New Dark Web Market OLVX Advertising Variety of Hacking Tools 

Threat actors exploit underground markets by purchasing or selling stolen data, malware, and hacking tools to facilitate cybercrime.  These underground…

Dynamic Malware Analysis using GPT-4 With 100% Recall Rate
14
Dec
2023

Dynamic Malware Analysis using GPT-4 With 100% Recall Rate

A new prompt engineering-assisted Dynamic Malware Analysis model has been introduced, which can overcome the drawbacks faced in the quality…

Zoom Mobile & Desktop App Flaw Let Attackers Escalate Privileges
14
Dec
2023

Zoom Mobile & Desktop App Flaw Let Attackers Escalate Privileges

The popular video conferencing software Zoom has security issues with its desktop and mobile apps that could allow for privilege…

Microsoft Seized Storm-1152 Websites to Sell Microsoft products
14
Dec
2023

Microsoft Seized Storm-1152 Websites to Sell Microsoft products

Hackers sell fake Microsoft products and accounts because it allows them to profit from illicit activities, taking advantage of unsuspecting…

Beware of Malicious 7ZIP on the Microsoft App Store
14
Dec
2023

Beware of Malicious 7ZIP on the Microsoft App Store

Hackers target 7ZIP due to its widespread use and popularity, making it a lucrative vector for spreading malware.  Exploiting vulnerabilities…

Recruiters Beware! Hackers Deliver Malware Posing Job Applicant
13
Dec
2023

Recruiters Beware! Hackers Deliver Malware Posing Job Applicant

Threat actors have been targeting recruiters disguised as job applicants to deliver their malware. Though this method is not unique,…

Hackers Abuse OAuth Applications to Automated Finacial Attacks
13
Dec
2023

Hackers Abuse OAuth Applications to Automated Finacial Attacks

OAuth (Open Authorization) is an industry-standard protocol that allows third-party applications to access a user’s data without exposing login credentials. …

Lazarus Operation Blacksmith Attacking Organizations Worldwide
13
Dec
2023

Lazarus Operation Blacksmith Attacking Organizations Worldwide

The Lazarus Group is a notorious North Korean state-sponsored hacking organization known for:- Cyber espionage Financial Theft Destructive attacks They…

Hackers Planting Credit Card Skimmers Using Google Tag Manager
12
Dec
2023

Hackers Planting Credit Card Skimmers Using Google Tag Manager

Recently, it has been reported that Magecart Veteran ATMZOW has found 40 new domains of Google Tag Manager. As a…

Stealing Browser Passwords & Cookies
12
Dec
2023

Stealing Browser Passwords & Cookies

A new malicious campaign, Editbot Stealer, was discovered in which threat actors use WinRAR archive files with minimal detection to…