Tuesday, October 15, 2024

Computer Security

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and perform financial transactions without any hassle.These wallets offer enhanced security compared to traditional payment methods,...

Best SIEM Tools List For SOC Team – 2024

The Best SIEM tools for you will depend on your specific requirements, budget, and organizational needs. There are several popular and highly regarded SIEM...

Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities across multiple Oracle products. This comprehensive update fixes critical flaws...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting the growing, widespread use and potential of Web3 user security...

How to Analyse an Advanced Phishing Attack with ANY.RUN Threat Intelligence Lookup

An advanced phishing attack typically involves sophisticated tactics such as compelling email and website replicas that are often tailored to specific targets.These attacks may...

New Azure Hacking Campaign Steals Senior Executive Accounts

An ongoing campaign of cloud account takeover has affected hundreds of user accounts, including those of senior executives, and impacted dozens of Microsoft Azure...

Warning: Hackers Exploit 3 Well-known Flaws in Microsoft Word & Excel

Despite not being 0-day or even 1-day vulnerabilities, three well-known and outdated CVEs in Microsoft Word and Excel continue to pose a threat to the...

Hackers Abuse Bot Protection Tool to Launch Cyber Attacks

Predator, a bot protection tool designed to fight against bots and crawlers, has now been found to be abused by threat actors for malicious...

New Gootloader Malware Abuses RDP to Spread Rapidly

Hackers target Remote Desktop Protocol (RDP) via malware because it provides them with remote access to a victim's computer or network, allowing them to:-Steal...

Hackers Abuse NuGet Packages to Deliver SeroXen RAT

The NuGet package manager, which .NET developers widely use, has been under attack by a series of malicious activities, according to a report by...

Hacker Group Infrastructure That Uses Weaponized MS Word Docs Uncovered

Gamaredon, also known as Primitive Bear, Actinium, or Shuckworm, is a Russian Advanced Persistent Threat (APT) group active since at least 2013.It is...