How to choose secure, verifiable technologies?
06
Dec
2024

How to choose secure, verifiable technologies?

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable…

Rockwell Automation Warns of Multiple Code Execution Vulnerabilities in Arena
06
Dec
2024

Rockwell Automation Warns of Multiple Code Execution Vulnerabilities in Arena

Rockwell Automation has issued a critical security advisory addressing multiple remote code execution (RCE) vulnerabilities discovered in its Arena® software….

U.S. Officials Warn Americans to Use Only Encrypted Messaging Apps
06
Dec
2024

U.S. Officials Warn Americans to Use Only Encrypted Messaging Apps

In the wake of an unparalleled cyberattack targeting major U.S. telecommunications providers, including AT&T, Verizon, and Lumen Technologies, federal officials…

Django Security Update, Patch for DoS & SQL Injection Vulnerability
06
Dec
2024

Django Security Update, Patch for DoS & SQL Injection Vulnerability

 The Django team has issued critical security updates for versions 5.1.4, 5.0.10, and 4.2.17. These updates address two vulnerabilities: a…

RevC2 Backdoor and Venom Loader
06
Dec
2024

More_eggs MaaS Expands Operations with RevC2 Backdoor and Venom Loader

Dec 06, 2024Ravie LakshmananMalware / Cybercrime The threat actors behind the More_eggs malware have been linked to two new malware…

Top Five Industries Aggressively Targeted By Phishing Attacks
06
Dec
2024

Top Five Industries Aggressively Targeted By Phishing Attacks

Phishing attacks continue to pose a significant threat to various industries, with cybercriminals employing sophisticated tactics to deceive recipients. A…

Researchers Released hrtng IDA Pro Plugin for Malware Analyst to Make Reverse Engineering Easy
06
Dec
2024

Researchers Released hrtng IDA Pro Plugin for Malware Analyst to Make Reverse Engineering Easy

The Global Research and Analysis Team (GReAT) has announced the release of hrtng, a cutting-edge plugin for IDA Pro, one of the…

Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware
06
Dec
2024

Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware

Dec 06, 2024The Hacker NewsMalware / Threat Intelligence The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels…

New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security
06
Dec
2024

QR Code-Based C2 Attack Bypasses All Type of Browser Isolation Security

Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to…

Europol Dismantled 50+ Servers Used For Fake Online Shopping Websites
06
Dec
2024

Europol Dismantled 50+ Servers Used For Fake Online Shopping Websites

Europol, in collaboration with law enforcement across Europe, has taken down a sophisticated cybercriminal network responsible for large-scale online fraud….

Rockwell Automation Vulnerabilities Let Attackers Execute Remote Code
06
Dec
2024

Rockwell Automation Vulnerabilities Let Attackers Execute Remote Code

Rockwell Automation, a leading provider of industrial automation solutions, has disclosed multiple critical vulnerabilities in its Arena software that could…

Multiple ICS Advisories Released by CISA Detailing Exploits & Vulnerabilities
06
Dec
2024

Multiple ICS Advisories Released by CISA Detailing Exploits & Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has released two advisories highlighting significant security vulnerabilities in Industrial Control Systems (ICS)…