Category: CyberSecurityNews

Wireshark 4.0.7
13
Jul
2023

Wireshark 4.0.7 Released – What’s New!

Wireshark, an industry-leading network packet analyzer, has released version 4.0.7, which includes defect fixes, protocol updates, and a few enhancements….

Flaw in Atlassian Companion for macOS Let Attacker Execute Remote Code
11
Jul
2023

Flaw in Atlassian Companion for macOS

When Atlassian Companion is installed on macOS, a vulnerability has been detected that enables remote code execution on users’ computers…

Multi-stage TOITOIN Trojan Abusing Amazon EC2 Instances
11
Jul
2023

Multi-stage TOITOIN Trojan Abusing Amazon EC2 Instances

New advanced malware targets LATAM businesses with TOITOIN Trojan, revealing intricate layers. The complete attack is based on a multi-stage…

Red Teaming In Cyber Security
11
Jul
2023

Role Of Red Teaming In Cyber Security

Testing your organization’s capacity to stop, identify, and respond to assaults is essential since cyber threats are developing at an…

Play Ransomware Attacking Private and Public Organizations
11
Jul
2023

Play Ransomware Attacking Private and Public Organizations

The ransomware attacks are becoming more frequent and rapidly increasing in size as well. This alarming pace of ransomware is…

New File Analysis Add-on with Microsoft 365 Defender Enable Deeper Insights
11
Jul
2023

New File Analysis Add-on with Microsoft 365 Defender

Microsoft has taken another step towards security which has revolutionized the way security professionals use Microsoft 365 Defender across devices…

SAP vulnerabilities Let Attacker Inject OS Commands—Patch Now!
11
Jul
2023

SAP vulnerabilities Let Attacker Inject OS Commands—Patch Now!

SAP has released their updates for patch day of this month, in which several vulnerabilities have been fixed and CVEs…

New MalasLocker Ransomware Attacks users of Zimbra servers
10
Jul
2023

New MalasLocker Ransomware Attacks users of Zimbra servers

A Notorious MalasLocker Ransomware, which has been active since March 2023, targets Zimbra servers and demands charity donations instead of…

Critics Mastodon “TootRoot” Vulnerability Allows Server Hijacking
10
Jul
2023

Critics Mastodon “TootRoot” Vulnerability Allows Server Hijacking

Mastodon is an open-source self-hosted social networking service company that is maintained as a non-profit. The platform is similar to…

ICMP Protocol
10
Jul
2023

What is ICMP Protocol ?

ICMP protocol is mainly used for error handling and primarily used for network devices (routers). Many different types of errors…

MOVEit SQLi Flaws
10
Jul
2023

New Critical and High-Severity SQL Injection Flaw in MOVEit

A critical-severity SQL injection flaw and two other high-severity vulnerabilities have been fixed in MOVEit Transfer, the software at the focus of the…

ARCrypt Ransomware Adapts TOR Communication Channels to Avoid detection
08
Jul
2023

ARCrypt Ransomware Adapts TOR Communication

A newly evolved linux variant of AR crypt malware developed with GO language started targeting worldwide. The emergence of AR…