Category: CyberSecurityNews

BGP Error Handling Flaw Leads to Prolonged Network Outage
01
Sep
2023

BGP Error Handling Flaw Leads to Prolonged Network Outage

BGP is the backbone protocol and the internet’s “glue,” which directs the routing decisions between ISP networks to hold the…

Mozilla Firefox 117: High-Severity Vulnerabilities Patched
01
Sep
2023

Mozilla Firefox 117: High-Severity Vulnerabilities Patched

With the release of Mozilla Firefox 117, 13 vulnerabilities are patched, including seven ‘High Severity’ flaws and four memory corruption flaws….

Critical Flaw in Zip Libraries Let Attackers Abuse ZIP archives
31
Aug
2023

Critical Flaw in Zip Libraries Let Attackers Abuse ZIP archives

According to recent reports, a number of vulnerabilities have been discovered in widely used ZIP libraries of Swift and Flutter….

Splunk IT Service Intelligence Flaw Let Attacker Inject ANSI Codes in Log Files
31
Aug
2023

Splunk IT Service Intelligence Flaw Let Attacker Inject ANSI Codes

Splunk has been reported with a Unauthenticated Log injection vulnerability in the Splunk IT Service Intelligence (ITSI) product. This vulnerability…

No-Code SaaS
31
Aug
2023

No-Code SaaS Security Breach Prevention Guide in 2023

With the growing trend of businesses transitioning their operations to cloud-based Software as a Service (SaaS) platforms, ensuring the security…

Cisco Unified Communications Products Flaw Let Attackers Escalate Privileges
31
Aug
2023

Cisco Unified Communications Products Flaw

A recent discovery has highlighted a privilege escalation vulnerability within Cisco Unified Communications Products. This vulnerability was found during internal…

Multiple Flaws VMware in Aria Operations for Networks Let Attackers Bypass Authentication
30
Aug
2023

Multiple Flaws in VMware Aria Operations for Networks

As per reports, VMware has been reported with two critical vulnerabilities that could allow threat actors to perform an authentication…

Don't Let Deviant Devices Dismantle your Cyber-Defense
30
Aug
2023

Don’t Let Deviant Devices Dismantle your Cyber-Defense

Although the use of peripheral devices has risen to unparalleled rates in the post-pandemic period, many organizations have failed to…

FBI Dismantle the Notorious Qakbot Infrastructure Used For Ransomware Attacks
30
Aug
2023

FBI Dismantle Qakbot Infrastructure Used For Ransomware Attacks

The FBI and the Justice Department have declared a global effort to disrupt and dismantle the Qakbot infrastructure, which is…

Five Families – Hackers Collaborate to Launch Notorious Cyber Attack
30
Aug
2023

Five Families – Hackers Collaborate to Launch Cyber Attack

The Five Families unites the underground internet world, adopting the name of the 1950s-60s New York mafia’s Italian-American clans. This…

Hackers using HTML Smuggling Technique to Deliver Ransomware and Evade Detection
29
Aug
2023

Hackers using HTML Smuggling Technique to Deliver Ransomware

Threat actors adopt the highly invasive techniques of HTML smuggling to launch  Nokoyawa ransomware despite being delivered through macro and…

How Hackers Abusing ChatGPT For Their Cybercriminal Activities
29
Aug
2023

How Hackers Abusing ChatGPT For Their Cybercriminal Activities

Media and frequent innovative releases aggressively fuel the rapid industry rise of generative AI (Artificial Intelligence) ChatGPT.  But, besides its…