Category: CyberSecurityNews
Multiple vulnerabilities have been discovered in Dell’s PowerProtect, which were associated with SQL injection, cross-site scripting (XSS), privilege escalation, command…
A new threat actor has been discovered to be using SQL injection attacks to gain unauthorized access to organizations in…
Threat actors exploit underground markets by purchasing or selling stolen data, malware, and hacking tools to facilitate cybercrime. These underground…
A new prompt engineering-assisted Dynamic Malware Analysis model has been introduced, which can overcome the drawbacks faced in the quality…
The popular video conferencing software Zoom has security issues with its desktop and mobile apps that could allow for privilege…
Hackers sell fake Microsoft products and accounts because it allows them to profit from illicit activities, taking advantage of unsuspecting…
Hackers target 7ZIP due to its widespread use and popularity, making it a lucrative vector for spreading malware. Exploiting vulnerabilities…
Threat actors have been targeting recruiters disguised as job applicants to deliver their malware. Though this method is not unique,…
OAuth (Open Authorization) is an industry-standard protocol that allows third-party applications to access a user’s data without exposing login credentials. …
The Lazarus Group is a notorious North Korean state-sponsored hacking organization known for:- Cyber espionage Financial Theft Destructive attacks They…
Recently, it has been reported that Magecart Veteran ATMZOW has found 40 new domains of Google Tag Manager. As a…
A new malicious campaign, Editbot Stealer, was discovered in which threat actors use WinRAR archive files with minimal detection to…











