Tuesday, January 21, 2025

cyber security

Google Patches Actively Exploited Android 0-day Privilege Escalation Vulnerability

Google has released a patch addressing a critical zero-day vulnerability that has been actively exploited.This vulnerability, CVE-2024-32896, is a privilege escalation flaw within the...

New Fury Stealer Attacking Victims to Steal Login Passwords

A new malicious software named "Fury Stealer" has been detected, posing a significant threat to online security.The malware, created by an unidentified threat...

RCE Vulnerability in D-Link WAP Let Attackers Gain Remote Access

The D-Link DAP-2310 Wireless Access Point (WAP) has been identified as vulnerable to remote code execution (RCE).Dark Wolf Solutions discovered this vulnerability, which seriously...

North Korean Hackers Actively Exploiting Chromium RCE Zero-Day In The Wild

Microsoft has identified a North Korean threat actor, Citrine Sleet, exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution on cryptocurrency...

Chrome Vulnerability Let Attackers Execute Arbitrary Code Remotely

The stable channel for desktops has been updated to version 128.0.6613.119/.120 for Windows and Mac, and 128.0.6613.119 for Linux.This update will be gradually...

CloudSOC – An OpenSource Project for SOC & Security Analysts

Security Operations Centers (SOCs) and security analysts are under immense pressure to stay ahead of potential attacks.Enter CloudSOC, an open-source project designed to...

BlackByte Hackers Exploiting VMware ESXi Auth Bypass Vulnerability

BlackByte, a Ransomware-as-a-Service (RaaS) group that surfaced about mid-2021 appears to have traces of Conti's evolution.It uses productive sophistication such as bypassing security measures...

Iranian Threat Group Attack US Organization via Ransomware

Iranian cyber actors have been identified as the perpetrators behind ransomware attacks targeting U.S. organizations across multiple sectors.This revelation comes from a joint Cybersecurity...