Category: CyberSecurityNews

A Security Mechanism To Stop AI-Based Breaking CAPTCHA
11
Feb
2025

A Security Mechanism To Stop AI-Based Breaking CAPTCHA

In the ongoing battle between cybersecurity and AI, researchers have introduced a groundbreaking innovation, IllusionCAPTCHA, a CAPTCHA system that leverages…

Akira Ransomware Leads The Number of Ransomware Attacks For January 2025
11
Feb
2025

Akira Ransomware Leads The Number of Ransomware Attacks For January 2025

January 2025 marked a significant month in the ransomware landscape, with Akira emerging as the leading threat. According to recent…

USB Army Knife - A Powerful Red Team Tool for Penetration Testers
11
Feb
2025

USB Army Knife – A Powerful Red Team Tool for Penetration Testers

The USB Army Knife is a versatile red-teaming tool for penetration testers that emulates a USB Ethernet adapter for traffic…

SouthKorea Spy Agency Says DeepSeek Excessively Collects Personal Data
11
Feb
2025

SouthKorea Spy Agency Says DeepSeek Excessively Collects Personal Data

SEOUL, South Korea’s National Intelligence Service (NIS) has raised concerns over the Chinese AI app DeepSeek, accusing it of “excessively”…

FinStealer Malware Attacking Leading Indian Bank's Mobile Users To Steal Login Credentials
11
Feb
2025

FinStealer Malware Attacking Leading Indian Bank’s Mobile Users To Steal Login Credentials

A sophisticated malware campaign dubbed “FinStealer” is actively targeting customers of a leading Indian bank through fraudulent mobile applications. The…

Alabama Man Pleaded Guilty for Hacking U.S. Securities & Exchange Commission X Account
11
Feb
2025

Alabama Man Pleaded Guilty for Hacking U.S. Securities & Exchange Commission X Account

Eric Council Jr., a 25-year-old from Athens, Alabama, pleaded guilty on February 10, 2025, to charges stemming from the January…

Researchers Unveiled Tactics, Techniques, and Procedures Used by North Korean Hackers
11
Feb
2025

Researchers Unveiled Tactics, Techniques, and Procedures Used by North Korean Hackers

Researchers have shed light recently on the sophisticated tactics, techniques, and procedures (TTPs) employed by North Korean hackers. This comprehensive…

Ubuntu Printing Vulnerability Let Attackers Execute Arbitrary Code on Locked Laptops
11
Feb
2025

Ubuntu Printing Vulnerability Let Attackers Execute Arbitrary Code on Locked Laptops

A recently discovered vulnerability in Ubuntu 22.04’s printing subsystem, specifically within the “ippusbxd” package, could have allowed attackers to execute…

Apple 0-Day Vulnerability Exploited in "Extremely Sophisticated" Attacks in the Wild
10
Feb
2025

Apple 0-Day Vulnerability Exploited in “Extremely Sophisticated” Attacks in the Wild

Apple has rolled out iOS 18.3.1 and iPadOS 18.3.1, addressing a Zero-day vulnerability exploited in targeted extremely sophisticated attacks by…

Quishing via QR Codes Emerging As a Top Attack Vector Used by Hackers
10
Feb
2025

Quishing via QR Codes Emerging As a Top Attack Vector Used by Hackers

QR codes have become an integral part of our digital lives, offering quick access to websites, services, and even payment…

8Base Ransomware Dark Web Site Seized, Four Operators Arrested
10
Feb
2025

8Base Ransomware Dark Web Site Seized, Four Operators Arrested

In a significant breakthrough against global cybercrime, Thai authorities announced today the arrest of four European nationals linked to the…

12K+ KerioControl Firewall Instances Vulnerable to 1-Click RCE Exploit
10
Feb
2025

12K+ KerioControl Firewall Instances Vulnerable to 1-Click RCE Exploit

A critical security vulnerability, CVE-2024-52875, has been identified in GFI KerioControl firewalls, affecting versions 9.2.5 through 9.4.5. This flaw, which…