Tuesday, April 16, 2024

New Azure Hacking Campaign Steals Senior Executive Accounts

0
An ongoing campaign of cloud account takeover has affected hundreds of user accounts, including those of senior executives, and impacted dozens of Microsoft Azure...

Warning: Hackers Exploit 3 Well-known Flaws in Microsoft Word & Excel

0
Despite not being 0-day or even 1-day vulnerabilities, three well-known and outdated CVEs in Microsoft Word and Excel continue to pose a threat to the...

Hackers Abuse Bot Protection Tool to Launch Cyber Attacks

0
Predator, a bot protection tool designed to fight against bots and crawlers, has now been found to be abused by threat actors for malicious...

New Gootloader Malware Abuses RDP to Spread Rapidly

0
Hackers target Remote Desktop Protocol (RDP) via malware because it provides them with remote access to a victim's computer or network, allowing them to:-Steal...

Hackers Abuse NuGet Packages to Deliver SeroXen RAT

0
The NuGet package manager, which .NET developers widely use, has been under attack by a series of malicious activities, according to a report by...

Hacker Group Infrastructure That Uses Weaponized MS Word Docs Uncovered

0
Gamaredon, also known as Primitive Bear, Actinium, or Shuckworm, is a Russian Advanced Persistent Threat (APT) group active since at least 2013.It is...

Responding To And Recovering From Physical Security Breaches

0
Unfortunately, data breaches and similarly related physical security threats are something of an eventuality in the modern world.Recently published data reveals 28% of...

Hackers Using Google Cloud Computing Platform To Deliver Targeted Malware Attacks via Weaponized PDF

0
Threat actors use the Google computing platform (GCP) to deliver the malware through malicious PDF files. The attack targeted governments and financial firms worldwide.According...

10 Cybersecurity Threats in 2024 and How to Protect Yourself

0
Cybersecurity Threats deal with emerging dangers and include protecting and preventing means against hacker attacks. New technologies are booming, and our gadgets are becoming...

DragonBlood – New Vulnerability in WPA3 Protocol Let Hackers Steal WiFi Password

0
Security researchers discovered a new vulnerability in WPA3 Protocol named "Dragonblood" which allows hackers to steal the WiFi Password from WP3 enabled WiFi Network.This...

Managed WAF protection

Website

Recent Articles