Thursday, January 23, 2025

cyber security

Microsoft Unveils New Identity Secure Score Recommendations in General Availability

Microsoft has announced the general availability of 11 new Identity Secure Score recommendations in Microsoft Entra, aimed at bolstering organizational security and providing actionable insights to mitigate risks.The...

New Cookie Sandwich Technique Allows Stealing of HttpOnly cookies

A new attack technique known as the "cookie sandwich" has surfaced, raising significant concerns among cybersecurity professionals.This technique enables attackers to bypass the HttpOnly...

The Growing Role of AI-Powered SAST in the Developer Toolkit

In today’s app dev world, where new apps and millions of lines of code are being deployed every day, the need for fast and...

New Contacto Ransomware Evades AV Detection & Uses Windows Console for Execution

In early January 2025, a new ransomware strain identified as Contacto surfaced, showcasing advanced techniques designed to bypass conventional security measures.This analysis provides...

Google’s “Sign in with Google” Flaw Exposes Millions of Users’ Details

A critical flaw in Google's "Sign in with Google" authentication system has left millions of Americans vulnerable to potential data theft.This vulnerability mainly...

Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability

A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the public internet.The attacks, observed by Arctic Wolf between November...

PriveShield – Advanced Privacy Protection with Browser Profile Isolation

A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on browsing history and user interaction, which disrupts cross-website tracking practices...

Hackers Brute Force Your Passwords?

Cybercrimes have always existed as a result of internet usage in our society. Traversing the wide web, hackers are trying to exploit any nooks...

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised EXE installer, as analysis revealed a parent-child relationship between...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in the cybersecurity community.This notorious Remote Access Trojan (RAT),...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto Networks' PAN-OS software.This flaw allows unauthenticated attackers to...