cyber security

Hackers Exploited by GraphQL Vulnerabilities to Compromise Organizations

Cyberattacks have highlighted vulnerabilities in GraphQL APIs, leading to significant security breaches in various organizations. GraphQL, a query language for…

5 months ago

Dark Web Marketplace Admins Busted Following Luxury Life

Two men living a life of luxury in Florida have been charged with cyber fraud after authorities became suspicious of…

5 months ago

Zoom Fixes Critical Vulnerabilities Allowing Privilege Escalation

Zoom Video Communications has recently disclosed several critical vulnerabilities affecting its Workplace Apps, SDKs, and Rooms Clients. These vulnerabilities, identified…

5 months ago

Authorities Seized Dispossessor Ransomware Servers

FBI Cleveland announced a significant victory against cybercrime by disrupting "Radar/Dispossessor," a notorious ransomware group led by the online moniker…

5 months ago

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to execute arbitrary SQL functions. This vulnerability…

5 months ago

Australian Gold Mining Company Reports Ransomware Attack

Evolution Mining Limited, a prominent global player in the gold mining industry, has reported a ransomware attack that impacted its…

5 months ago

NCSC to Build Nation-Scale Evidence Base for Cyber Deception

The UK's National Cyber Security Centre (NCSC) recently hosted an unprecedented conference at its London headquarters, bringing together international government…

5 months ago

Authorities Arrested Two Admins of WWH-Club Stolen Credit Card Marketplace

U.S. authorities have arrested two believed administrators of the notorious WWH-Club, an online marketplace for stolen credit card information. The…

5 months ago

Threat Actors Exploiting Windows Systems To Deploy Multiple Malwares

A sophisticated phishing campaign targeting Windows systems leverages multiple evasion techniques, including Python obfuscation, shellcode generation, and loading, to deploy…

6 months ago

0.0.0.0 Day – 18 Yr Old Vulnerability Allow Attackers to Bypass All Browser Security

Threat actors often target and exploit security flaws in web browsers, as exploiting flaws in web browsers enables them to…

6 months ago