Zabbix Server Vulnerability
13
Aug
2024

Zabbix Server Vulnerability Lets Attacker Execute Arbitrary Code

A critical security vulnerability, identified as CVE-2024-22116, has been patched in Zabbix, a popular monitoring solution. The vulnerability allowed an…

From Cartels to Crypto: Trends Show Disruptive Cybercrime Evolving Rapidly
13
Aug
2024

From Cartels to Crypto: Trends Show Disruptive Cybercrime Evolving Rapidly

Cybercrime has expanded well beyond traditional practices like credit card theft and identity fraud. We are now witnessing the emergence of a…

Beware Of Malicious Typosquat Package That Steals Your Secret Keys
13
Aug
2024

Beware Of Malicious Typosquat Package That Steals Your Secret Keys

Hackers often target the Solana Python API ecosystem to exploit vulnerabilities in decentralized applications, access private keys, or manipulate transactions…

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts
13
Aug
2024

Authorities Seized Dispossessor Ransomware Servers

FBI Cleveland announced a significant victory against cybercrime by disrupting “Radar/Dispossessor,” a notorious ransomware group led by the online moniker…

FBI
13
Aug
2024

FBI Shuts Down Dispossessor Ransomware Group’s Servers Across U.S., U.K., and Germany

The U.S. Federal Bureau of Investigation (FBI) on Monday announced the disruption of online infrastructure associated with a nascent ransomware…

CERT-UA warns of a phishing campaign targeting government entities
13
Aug
2024

CERT-UA warns of a phishing campaign targeting government entities

CERT-UA warns of a phishing campaign targeting government entities Pierluigi Paganini August 13, 2024 CERT-UA warned that Russia-linked actor is impersonating the…

VPN Server Post exploitation technique
13
Aug
2024

Post-Exploitation Technique After Hacking Ivanti, Fortigate VPN Servers

Akamai researchers have delved into the often-overlooked threat of VPN post-exploitation, highlighting techniques that threat actors can use to escalate…

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts
13
Aug
2024

DeathGrip Ransomware Expanding Services Using RaaS Service

A new Ransomware-as-a-Service (RaaS) platform known as DeathGrip has surfaced, offering sophisticated ransomware tools to aspiring cyber criminals. This service…

US DoJ dismantled remote IT worker fraud schemes run by North Korea
13
Aug
2024

US DoJ dismantled remote IT worker fraud schemes run by North Korea

US DoJ dismantled remote IT worker fraud schemes run by North Korea Pierluigi Paganini August 13, 2024 The U.S. DoJ…

AMD Sinkclose Vulnerability Let Attackers Most Privileged Portions
13
Aug
2024

AMD Sinkclose Vulnerability Let Attackers Most Privileged Portions

A Sinkclose vulnerability, which has been detected in AMD processors for decades, lets hackers obtain access to some of the…

Sharjah Finance Dept. Launches New Cyber Defense Center
13
Aug
2024

Sharjah Finance Dept. Launches New Cyber Defense Center

In a significant stride towards fortifying digital security, the Sharjah Finance Department (SFD) officially inaugurated its new Cyber Defense Center. …

Government likens myGov to a garaged Ferrari
13
Aug
2024

Government likens myGov to a garaged Ferrari – Security

The government is hoping to increase usage of myGov by expanding it beyond its current role as a gateway to…