Windows Zero-Day
16
Oct
2024

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

Oct 16, 2024Ravie LakshmananZero-Day / Windows Security The North Korean threat actor known as ScarCruft has been linked to the…

Multiple Flaws Impacting Boot Chain Of Samsung Devices
16
Oct
2024

Multiple Flaws Impacting Boot Chain Of Samsung Devices

The Android boot chain initiates with the “Boot ROM,” which initializes the “bootloader.” The bootloader then loads the kernel, which is…

Hackers Abuse EDRSilencer Red Team Tool To Evade Detection
16
Oct
2024

Hackers Abuse EDRSilencer Red Team Tool To Evade Detection

EDRSilencer, a red team tool, interferes with EDR solutions by blocking network communication for associated processes using the WFP, which…

Defenders must adapt to shrinking exploitation timelines
16
Oct
2024

Defenders must adapt to shrinking exploitation timelines

A new report from Mandiant reveals that the average time-to-exploit vulnerabilities before or after a patch is released has plunged…

The Tor logo
16
Oct
2024

Tor Browser and Firefox users should update to fix actively exploited vulnerability

Mozilla has announced a security fix for its Firefox browser which also impacts the closely related Tor Browser. The new…

AI Risks and Attacks
16
Oct
2024

From Misuse to Abuse: AI Risks and Attacks

Oct 16, 2024The Hacker NewsArtificial Intelligence / Cybercrime AI from the attacker’s perspective: See how cybercriminals are leveraging AI and…

Linux System ‘noexec’ Mount Flag Bypass Allows Malicious Code Execution
16
Oct
2024

Linux System ‘noexec’ Mount Flag Bypass Allows Malicious Code Execution

A recent discovery in the Linux ecosystem has unveiled a method to bypass the ‘noexec’ mount flag, enabling malicious code…

Applying IT observability to deliver business metrics
16
Oct
2024

Applying IT observability to deliver business metrics

The recent Dynatrace Innovate event, which took place earlier this month in Amsterdam, showcased the company’s ambitions to extend observability…

U.S. CISA adds Microsoft Windows Kernel, Mozilla Firefox and SolarWinds Web Help Desk bugs to its Known Exploited Vulnerabilities catalog
16
Oct
2024

U.S. CISA adds Microsoft Windows Kernel, Mozilla Firefox and SolarWinds Web Help Desk bugs to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Microsoft Windows Kernel, Mozilla Firefox and SolarWinds Web Help Desk bugs to its Known Exploited Vulnerabilities catalog Pierluigi…

Critical Oracle Security Update, 334 Vulnerabilities Patched
16
Oct
2024

Critical Oracle Security Update, 334 Vulnerabilities Patched

Oracle has released its October 2024 Critical Patch Update (CPU), addressing a staggering 334 security vulnerabilities across its vast product…

Android 15 unveils new security features to protect sensitive data
16
Oct
2024

Android 15 unveils new security features to protect sensitive data

Android 15 brings enhanced security features to protect your sensitive health, financial, and personal data from theft and fraud. It…

Cyber Threat Intelligence
16
Oct
2024

5 Techniques for Collecting Cyber Threat Intelligence

To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly…