Rebecca3
cyber security
Russian Seashell Blizzard Targets Organizations Using Custom-Built Hacking Tools
Seashell Blizzard, also known as APT44, Sandworm, and Voodoo Bear, has emerged as a sophisticated adversary targeting critical sectors worldwide.Associated with Russia's Military...
Cyber Attack
EvilCorp and RansomHub Collaborate to Launch Worldwide Attacks on Organizations
EvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the most active ransomware-as-a-service (RaaS) operations.This partnership has heightened the...
AI
AI-Powered Gray Bots Target Web Applications with Over 17,000 Requests Per Hours
Web applications are facing a growing challenge from "gray bots," a category of automated programs that exploit generative AI to scrape vast amounts of...
Cyber Security News
New Web Skimming Attack Exploits Legacy Stripe API to Validate Stolen Card Data
A sophisticated web-skimming campaign has been discovered, leveraging a deprecated Stripe API to validate stolen credit card data before exfiltration.This novel strategy ensures that...
Apache
Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials
A newly discovered attack campaign has exposed vulnerabilities in Apache Tomcat servers, allowing hackers to hijack resources and steal SSH credentials.Researchers from Aqua...
Cyber Security News
Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords
Recent cybersecurity findings reveal an alarming increase in malicious activity targeting Juniper's Session Smart Networking Platform (SSR).According to SANS tech reports, Attackers are focusing...
CVE/vulnerability
Google’s Quick Share for Windows Vulnerability Allows Remote Code Execution
Cybersecurity researchers from SafeBreach Labs have revealed new vulnerabilities in Google’s Quick Share file-transfer utility for Windows, including a critical flaw that allows attackers...
CVE/vulnerability
Multiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers
Jenkins, the widely used open-source automation server, faces heightened security risks after researchers disclosed 11 critical vulnerabilities across its core software and eight plugins.These flaws expose...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.