Friday, January 17, 2025

Cyber Security News

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

0
Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions of its native clients for Amazon WorkSpaces, Amazon AppStream...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

0
Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing campaigns are delivered via Telegram and use unique URLs...

New Tool Unveiled to Scan Hacking Content on Telegram

0
A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI module designed to monitor and analyze content on Telegram.Known...

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability

0
A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables remote unauthenticated attackers to execute arbitrary code.As of January...

Let’s Encrypt Unveils Six-Day Certificate and IP Address Options for 2025

0
Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP address certificates in 2025.This initiative is part of the organization's...

Bug Bounty Bonanza: $40,000 Reward for Escalating Limited Path Traversal to RCE

0
As a dedicated bug bounty hunter with an enviable track record on BugCrowd, Abdullah Nawaf, Full full-time bug Bounty Hunter, thrives on the thrill of...

BitMEX Fined $100 Million for Violating Bank Secrecy Act

0
In a significant legal development, HDR Global Trading Ltd., operating under the name BitMEX, has been fined $100 million for violating the Bank Secrecy...
SIEM as a Service

Recent News

Zoom Security Update – Patches Multiple Vulnerabilities That Let Attackers Escalate Privileges

0
Zoom Video Communications has released a critical security update addressing multiple vulnerabilities in its suite of applications, including a high-severity flaw that could allow...

Let’s Encrypt Unveils Six-Day Certificate and IP Address Options for 2025

0
Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP address certificates in 2025.This initiative is part of the organization's...

Apple Announces Information Security Internship For Students – Apply Now

0
Apple Inc. has officially opened applications for its highly anticipated Information Security Internship, aimed at students eager to dive into the dynamic world of...

PoC Exploit Released for Critical macOS Sandbox Vulnerability (CVE-2024-54498)

0
A proof-of-concept (PoC) exploit has been publicly disclosed for a critical vulnerability impacting macOS systems, identified as CVE-2024-54498.This vulnerability poses a significant security risk by...

New Tool Unveiled to Scan Hacking Content on Telegram

0
A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI module designed to monitor and analyze content on Telegram.Known...

Credit Card Skimmer Hits WordPress Checkout Pages, Stealing Payment Data

0
Researchers analyzed a new stealthy credit card skimmer that targets WordPress checkout pages by injecting malicious JavaScript into the WordPress database. On checkout pages, the...

Wultra Raises €3M to Defend Quantum Cyber Threats Targets Financial Institutions

0
Quantum computing is set to revolutionize technology, but it also presents a significant security risk for financial institutions.Czech cybersecurity startup Wultra has raised...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

0
Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions of its native clients for Amazon WorkSpaces, Amazon AppStream...

Hackers Using YouTube Links and Microsoft 365 Themes to Steal Logins

0
Cybercriminals are executing sophisticated phishing attacks targeting Microsoft 365 users by employing deceptive URLs that closely resemble legitimate O365 domains, creating a high degree...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary