Category: CyberSecurityNews

IBM Security Verify Access Let Attacker conduct phishing attacks
31
Jul
2023

IBM Security Verify Access Flaw Let Attacker Launch Phishing Attacks

An Open-redirect vulnerability was discovered by IBM, which could allow threat actors to spoof the original URL of IBM Security…

Roundup of Threat and Vulnerability
29
Jul
2023

Weekly Roundup of Threat and Vulnerability from July 23rd to 29th

This week’s Threat and Vulnerability Roundup is here! We at Cyber Writes take pride in delivering a weekly roundup of…

Hackers Stole 8 Million Data From U.S. Gov Services Contractor
28
Jul
2023

Hackers Stole 8 Million Data From U.S. Gov Services Contractor

Using a vulnerability in MOVEit Transfer, hackers gained access to 8 to 11 million individuals’ ‘Users Data’ protected health information….

Metabase Critical Flaw Permit Attackers to Act as Servers – Critical Update
28
Jul
2023

Metabase Critical Flaw Permit Attackers to Act as Servers

Recent reports indicate that Metabase has been discovered with an unauthenticated Remote Code Execution (RCE) vulnerability that lets threat actors…

Android Phones Will Now Warn About Unknown Bluetooth Trackers, Including AirTags
28
Jul
2023

Android Phones Warn About Bluetooth Trackers & AirTags

Google has announced an alerting and manual scanning mechanism which can be used to find unknown tracker alerts. This feature…

Over 60% of AWS Environments Exposed to Zenbleed Attacks
28
Jul
2023

Over 60% of AWS Environments Exposed to Zenbleed Attacks

AMD Zenbleed 2 processors were found vulnerable to use-after-free flaws, enabling data theft. While the exploitation of this flaw demands…

ModSecurity WAF Flaw Let Hackers Trigger DoS Attack
28
Jul
2023

ModSecurity WAF Flaw Let Hackers Trigger DoS Attack

Trustwave’s open-source Web Application Firewall (WAF) engine, ModSecurity, faces DoS risk due to four transformation actions vulnerability. Cybersecurity researchers at…

Hackers Exploit Windows Search
28
Jul
2023

Hackers Exploit Windows Search Feature to Execute Malware

Malware authors persistently seek novel approaches to exploit unsuspecting users in the active cyber threat landscape. To easily locate all…

Hackers distribute PurpleFox Malware Using MS-SQL Servers
28
Jul
2023

Hackers distribute PurpleFox Malware Using MS-SQL Servers

The purple fox malware has been active since 2018, adopting a new technique to deliver its payload through MS SQL…

New Black Hat AI Tool Launched by Cybercriminals
27
Jul
2023

New Black Hat AI Tool Launched by Cybercriminals

Along with tech companies, cybercriminals are also actively leveraging generative AI models for creating AI-powered chatbots. The growing rise of…

API Security – Top 4 Challenges Faced by CISOs
26
Jul
2023

API Security – Top 4 Challenges Faced by CISOs

CISOs recognize the importance of integrating web applications and API security to protect sensitive customer data while facilitating seamless business…

Over 19 Million Password Logs Sold on the Dark Web and Telegram
26
Jul
2023

Over 19 Million Password Logs Sold on the Dark Web and Telegram

The rapid increase of info stealers has emerged as a major risk for organizations, including chatGPT, and has led to…