Saturday, December 9, 2023

Cyber Security News

Intrusion Detection System (IDS) – A Detailed Guide & Working Function -SOC/SIEM

An intrusion detection system (IDS) gathers and analyzes information from within a computer or network to identify unauthorized access, misuse, and possible violations.IDS also can...
AvosLocker Ransomware

Hackers Using Remote Admin Tools To Compromise Organizations With Ransomware

Cybercriminals behind the AvosLocker ransomware attack employed a tactic of infecting organizations through Open-Source Remote Administration Tools.This method allowed the malware to spread...

Hackers Deliver Weaponized Notepad++ Via Google Ads

Cybercriminals are known to exploit malicious advertising techniques for targeting the widely-used Notepad++ text editor for Windows. This could lead to the dissemination of...

Synology NAS System Flaw Let Attackers Remotely Hijack the Admin Account

Synology DiskStation Manager (DSM) powers Synology NAS systems, offering remote file access and management. The DSM OS includes two default Linux users: 'admin' and...
Raven Vulnerability Scanner Tool

Raven: Open-source CI/CD Pipeline Vulnerability Scanner Tool

Cycode is excited to introduce Raven, a state-of-the-art security scanner for CI/CD pipelines. Raven stands for Risk Analysis and Vulnerability Enumeration for CI/CD Pipeline Security,...

Researchers Uncovered a New Flaw in ChatGPT to Turn Them Evil

LLMs are commonly trained on vast internet text data, often containing offensive content. To mitigate this, developers use "alignment" methods via finetuning to prevent...
Hackers Abuse Discord

Threat Actors Abuse Discord to Blend Within Organizations’ Network Traffic

Discord has become a household name in online gaming and digital communication. Gamers, friends, and families flock to this platform to chat, share, and collaborate....

Microsoft to Kill NTLM and Expand Kerberos Authentication

In an ever-changing digital landscape, robust security measures are paramount. As Windows adapts to meet the evolving demands of our world, user authentication, a cornerstone...

Pro-Russia Hacker Groups Exploiting Winrar Flaw to Steal Login Credentials

A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831 using a Powershell script...

Okta Support System Hacked, Users Sensitive Data Exposed

The US-based software firm Okta has discovered malicious activity using a stolen credential to access Okta's support case management system. An attacker was able...

Managed WAF protection


Recent Articles