Category: CyberSecurityNews

MGM Resorts Refused to Pay Hacker Demand in Cyberattack
09
Oct
2023

MGM Resorts Refused to Pay Hacker Demand in Cyberattack

In recent news, MGM Resorts International took a bold stance in the face of a cyberattack, refusing to give in…

GoldDigger Disguises as Fake Android App To Steal Banking Credentials
09
Oct
2023

GoldDigger Disguises as Fake Android App To Steal Banking Credentials

GoldDigger, a new Android Trojan, imitates a fraudulent Android application and has been discovered to spoof both a Vietnamese government…

Threat Actors Employ Remote Admin Tools to Gain Access over Corporate Networks
09
Oct
2023

Threat Actors Employ Remote Admin Tools to Gain Access

Recently, threat actors have adapted tactics, exploiting the appeal of banned apps in specific regions, making users more susceptible to…

Why choose when you can have both? IT management OR IT security
06
Oct
2023

Why choose when you can have both? IT management OR IT security

Forget about security versus productivity! The tug-of-war between management and security solutions to coexist in a single endpoint is the…

Cisco Emergency Responder Vulnerability Let Remote Attacker Login as Root User
06
Oct
2023

Cisco Emergency Responder Vulnerability Attacks Root User

Cisco was reported with a critical vulnerability that could allow threat actors to log in to the affected devices as…

Zero-Days for Hacking WhatsApp Are Now Worth Millions of Dollars
06
Oct
2023

Zero-Days for Hacking WhatsApp Are Now Worth Millions of Dollars

Securing the devices running iOS and Android operating systems is now costly due to improved defenses.  According to a recent…

Apple Emergency Update for New Zero-Day Used to Hack iPhones
05
Oct
2023

Apple Emergency Update for New Zero-Day Used to Hack iPhones

Apple has discovered a Zero-day vulnerability affecting iOS and iPadOS versions earlier than 17.0.3, which could allow threat actors to…

Open-Source Botnet That Obtain SSH Shell Access
05
Oct
2023

Open-Source Botnet That Obtain SSH Shell Access

The digital age offers opportunities but also increases the importance of cybersecurity as threats grow in complexity and sophistication, making…

Threat Actors Deployed Python Packages to Steal System Data
05
Oct
2023

Threat Actors Deployed Python Packages to Steal System Data

In the open-source ecosystem, shadows shift as collaboration succeeds, attracting both novices and skilled threat actors. A rising threat has…

Wireshark 4.0.10
05
Oct
2023

Wireshark 4.0.10 Released: What’s New!

Wireshark has been the most widely used open-source Network protocol analyzing tool for several purposes, including troubleshooting, analysis, development, and…

Qualcomm Sys Hackers Actively Exploit 3 new Zero-Days – Patch Now
05
Oct
2023

Qualcomm Sys Hackers Actively Exploit 3 new Zero-Days

Three new zero days have been reported to Qualcomm, which were CVE-2023-33106, CVE-2023-33107, and CVE-2023-33063. These vulnerabilities were discovered as…

EvilProxy Attacking Microsoft 365 accounts abusing open redirection in the Indeed.com
05
Oct
2023

EvilProxy Attacking Microsoft 365 accounts in the Indeed.com

A recent phishing campaign, identified by Menlo Labs, has been actively targeting executives in senior roles across multiple industries, with…