CISA New Tool
24
Mar
2023

CISA Released a New Tool to Detect Hacking Activity

As part of its ongoing efforts to protect Microsoft cloud environments against malicious activity, CISA recently introduced an open-source incident…

LATEST CYBERTHREATS AND ADVISORIES - MARCH 24, 2023
24
Mar
2023

LATEST CYBERTHREATS AND ADVISORIES – MARCH 24, 2023

[ This article was originally published here ] By John Weiler   FBI arrests Breached hacking forum leader, smartphones hijacked without…

Hacker typing at a keyboard
24
Mar
2023

‘Bitter’ espionage hackers target Chinese nuclear energy orgs

A cyberespionage hacking group tracked as ‘Bitter APT’ was recently seen targeting the Chinese nuclear energy industry using phishing emails…

Synopsys discover new vulnerability in Pluck Content Management System
24
Mar
2023

Synopsys discover new vulnerability in Pluck Content Management System

Software security company Synopsys have discovered a new remote code execution vulnerability (RCE) in the Pluck CMS system. Pluck is…

Malicious ChatGPT Chrome Extension Steal Facebook Accounts
24
Mar
2023

Malicious ChatGPT Chrome Extension Steal Facebook Accounts

Thousands of Facebook accounts have been stolen due to a trojanized version of the legitimate ChatGPT extension for Google Chrome….

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
24
Mar
2023

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data

Mar 24, 2023Ravie LakshmananDevSecOps / Software Security A malicious Python package on the Python Package Index (PyPI) repository has been…

goa cyber attack
24
Mar
2023

Clop Ransomware Lists The Indian State As Victim

After a host of targets including the City of Toronto, Hitachi Energy, and P&G, the government of the Indian state…

community/KCSA-CVE-2020-28914.md at main · kata-containers/community · GitHub
24
Mar
2023

community/KCSA-CVE-2020-28914.md at main · kata-containers/community · GitHub

announcement-date: 2020-11-17 id: KCSA-CVE-2020-28914 title: Kata Containers Improper file permissions for read-only volumes description: An improper file permissions vulnerability affects…

Journalist Attacked With USB Drive That Detonated After Inserting into PC
24
Mar
2023

Journalist Targeted in USB Drive Bombing Attack

The USB drive was found to contain RDX, a military-grade explosive substance that was inside a capsule attached to the…

Intel vPro platform unveils advanced security measures
24
Mar
2023

Intel vPro platform unveils advanced security measures

Intel has launched the latest Intel vPro platform, which is powered by 13th Gen Intel Core processors and offers a…

GitHub
24
Mar
2023

GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations

Mar 24, 2023Ravie LakshmananCloud Security / Programming Cloud-based repository hosting service GitHub said it took the step of replacing its…

National Crime Agency sting operation infiltrates cyber crime market
24
Mar
2023

National Crime Agency sting operation infiltrates cyber crime market

The National Crime Agency has infiltrated a cyber crime marketplace by setting up websites pretending to offer the tools needed…