Cyber Security News
NFS Protocol Security Bypassed To Access Files From Remote Server
The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and Kerberos, providing cryptographic verification. While Kerberos offers strong security, its Linux configuration can be complex,...
cyber security
Hackers Exploiting PLC Controllers In US Water Management System To Gain Remote Access
A joint Cybersecurity Advisory (CSA) warns of ongoing exploitation attempts by Iranian Islamic Revolutionary Guard Corps (IRGC)-affiliated cyber actors using the online persona "CyberAv3ngers." These...
Cyber Attack
Hackers Hijacked Misconfigured Servers For Live Streaming Sports
Recent threat hunting activities focused on analyzing outbound network traffic and binaries within containerized environments.By cross-referencing honeypot data with threat intelligence platforms, researchers...
cryptocurrency
Crypto Network Security: Essential Tips To Protect Your Digital Assets In 2023Â
Exploring the world of cryptocurrencies has been a thrilling journey for me. The allure of digital currencies lies not just in their potential for...
Cyber Attack
New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR
RansomHub has recently employed a novel attack method utilizing TDSSKiller and LaZagne, where TDSSKiller, traditionally used to disable EDR systems, was deployed to compromise...
Cyber Attack
Chinese Hackers Using Open Source Tools To Launch Cyber Attacks
Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a modified version of the open-source network scanning tool NBTscan over...
Cyber Security News
Researchers Details Attacks On Air-Gaps Computers To Steal Data
The air-gap data protection method isolates local networks from the internet to mitigate cyber threats and protect sensitive data, which is commonly used by...
CVE/vulnerability
Versa Director Zero-day Vulnerability Let Attackers Upload Malicious Files
Versa Networks specializes in successful business. It offers Secure Access Service Edge (SASE), consolidating networking and security services in a single, cloud-based platform.Enterprises and...
Cyber Attack
Iranian APT42 Actors Conducting World Wide Surveillance Operations
APT42 (aka Damselfly, UNC788, CALANQUE, Charming Kitten) is a sophisticated Iranian state-sponsored cyber espionage group. This Advanced Persistent Threat (APT) group is known for its...
Cyber Attack
Earth Baku Using Customized Tools To Maintain Persistence And Steal Data
Earth Baku, an APT actor who initially focused on the Indo-Pacific region, has grown its activities extensively since late 2022.The group has increased its...
cyber security
0.0.0.0 Day – 18 Yr Old Vulnerability Allow Attackers to Bypass All Browser Security
Threat actors often target and exploit security flaws in web browsers, as exploiting flaws in web browsers enables them to gain unauthorized access and...