Gurubaran

Gurubaran

Deloitte Denies Breach, Claims Only Single System AffectedDeloitte Denies Breach, Claims Only Single System Affected

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish the data it had stolen earlier…

4 months ago
Windows NTLM Zero-Day Vulnerability Exposes User CredentialsWindows NTLM Zero-Day Vulnerability Exposes User Credentials

Windows NTLM Zero-Day Vulnerability Exposes User Credentials

A critical zero-day vulnerability affecting all modern Windows Workstation and Server versions has been discovered. The flaw enables attackers to…

4 months ago
Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature VerificationCisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification

Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification

A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially allowing attackers to bypass image signature…

4 months ago
Ransomware Developer Mikhail Matveev Arrested in RussiaRansomware Developer Mikhail Matveev Arrested in Russia

Ransomware Developer Mikhail Matveev Arrested in Russia

Russian authorities have arrested Mikhail Matveev, a notorious Russian hacker linked to multiple ransomware attacks worldwide. Matveev, who was also…

4 months ago
FortiClient VPN Flaw Enables Undetected Brute-Force AttacksFortiClient VPN Flaw Enables Undetected Brute-Force Attacks

FortiClient VPN Flaw Enables Undetected Brute-Force Attacks

A design flaw in the logging mechanism of Fortinet's VPN servers has been uncovered, allowing attackers to conduct brute-force attacks…

4 months ago
macOS WorkflowKit Race Vulnerability Allows Malicious Apps to Intercept ShortcutsmacOS WorkflowKit Race Vulnerability Allows Malicious Apps to Intercept Shortcuts

macOS WorkflowKit Race Vulnerability Allows Malicious Apps to Intercept Shortcuts

A race condition vulnerability in Apple's WorkflowKit has been identified, allowing malicious applications to intercept and manipulate shortcuts on macOS…

4 months ago
Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code RemotelyCritical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors to remotely compromise affected devices.…

5 months ago
Researchers Detailed Credential Abuse CycleResearchers Detailed Credential Abuse Cycle

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them to gain unauthorized access. This…

5 months ago
Researchers Detailed Credential Abuse CycleResearchers Detailed Credential Abuse Cycle

Researchers Detailed Credential Abuse Cycle

The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a hacking group responsible for distributed denial-of-service…

5 months ago
Rise Of Ransomware-As-A-Service Leads To Decline Of Custom ToolsRise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools

Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools

Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market. Unlike traditional standalone ransomware sales, RaaS offers a subscription-based model where attackers…

5 months ago