Cloud Accounts
06
Dec
2023

Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts

Dec 06, 2023NewsroomAccess Management / Cloud Security Threat actors can take advantage of Amazon Web Services Security Token Service (AWS…

Nissan is investigating cyberattack and potential data breach
06
Dec
2023

Nissan is investigating cyberattack and potential data breach

Japanese car maker Nissan is investigating a cyberattack that targeted its systems in Australia and New Zealand, which may have…

Hackers Exploiting Crypto Liquidity Pools to Execute Trades
06
Dec
2023

Hackers Exploiting Crypto Liquidity Pools to Execute Trades

Crypto pool liquidity is the total assets locked in a decentralized finance (DeFi) liquidity pool. Hackers manipulate the pool liquidity…

Kali Linux 2023.4
06
Dec
2023

Hackers Employ AI to Launch Highly sophistication Attacks

It has been observed that threat actors are using AI technology to conduct illicit operations on social media platforms. These…

Atsign releases SSH No Ports 4.0 with Windows support and SDK
06
Dec
2023

Atsign releases SSH No Ports 4.0 with Windows support and SDK

Atsign has unveiled the release of SSH No Ports 4.0. SSH No Ports is a system administration tool used to…

Nget Stealer
06
Dec
2023

Unraveling The Information Stealer Of 2024

Apart from the daily activity on the dark web, a new surface-level menace has emerged on the scene – the…

Searchlight Cyber launches Exposure Data view in DarkIQ
06
Dec
2023

Searchlight Cyber launches Exposure Data view in DarkIQ

Searchlight Cyber has launched a new Exposure Data view in DarkIQ, collating 450+ billion dark web data points from data…

Bug Bytes #218 – Advent of Cyber, RCEs and hacking poems
06
Dec
2023

Bug Bytes #218 – Advent of Cyber, RCEs and hacking poems

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…

Sierra Wireless Routers
06
Dec
2023

Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks

Dec 06, 2023NewsroomCyber Threat / Vulnerability A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular…

Experts demonstrate a post-exploitation tampering technique to display Fake Lockdown mode
06
Dec
2023

Experts demonstrate a post-exploitation tampering technique to display Fake Lockdown mode

Experts demonstrate a post-exploitation tampering technique to display Fake Lockdown mode Pierluigi Paganini December 06, 2023 Researchers devised a new…

Unveiling the Threat of Malicious Browser Extensions
06
Dec
2023

Unveiling the Threat of Malicious Browser Extensions

Dec 06, 2023The Hacker NewsBrowser Security / Privacy Compromising the browser is a high-return target for adversaries. Browser extensions, which…

Adobe ColdFusion Vulnerability
06
Dec
2023

Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers

Dec 06, 2023NewsroomVulnerability / Web Server Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of…