Tuesday, October 15, 2024

Cyber Security News

Hackers Allegedly Selling Data Stolen from Cisco

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The breach, allegedly carried out by a collective known as IntelBroker in collaboration with EnergyWeaponUser and...

Fortigate SSLVPN Vulnerability Exploited in the Wild

A critical vulnerability in Fortinet's FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in the wild.This format string flaw vulnerability has raised significant...

Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code

Splunk has disclosed multiple vulnerabilities affecting its Enterprise product, which could allow attackers to execute remote code.These vulnerabilities, primarily affecting Windows installations, highlight...

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on critical infrastructure in the UAE and wider Gulf region. The group...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies and connecting to various IP addresses.It establishes multiple backdoor connections...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further investigation, where researchers have identified 40 variants, 16 droppers, and...

pac4j Java Framework Vulnerable to RCE Attacks

A critical security vulnerability has been discovered in the popular Java framework pac4j. The vulnerability specifically affects versions before 4.0 of the pac4j-core module....

Beware of Fake AI Scam calls that Takeover your Gmail Account

Scammers use sophisticated AI technology to impersonate tech giants like Google, aiming to take over unsuspecting users' Gmail accounts.A recent incident highlights these...

Zendesk Email Spoofing Flaw Let Attackers Access Support Tickets

A security vulnerability in Zendesk, a widely used customer service tool, has been uncovered. This flaw allowed attackers to access support tickets from any...

18 Individuals Charged for Widespread Manipulation Cryptocurrency Markets

18 individuals and entities have been charged with widespread fraud and manipulation within the cryptocurrency markets.The charges, unsealed in Boston, target leaders of four...

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, which is designed specifically for NAF (New...