Thursday, February 27, 2025

Security News

Critical Vulnerability with CredSSP Protocol Affects WinRM and RDP on all Windows Versions to Date

A critical remote code execution vulnerability with Credential Security Support Provider protocol (CredSSP protocol) that exploit RDP and WinRM on all the version of...

Avast Shares CCleaner Hack Investigation Report that Reveals Third Stage Payload with Keylogger Capabilities

Avast shared the CCleaner hack investigation report at the Security Analyst Summit in Mexico, researchers said the malware was installed on the built servers...

Researchers bypassed Windows 10 Lock Protection and Access Cortana Voice Commands that leads to Install Malware

The researcher discovered a new flaw in Windows 10 lock Protection that allows attackers to access the Cortana Voice Commands in the locked system...

In a Single Night Cybercriminal Gang stole 3.8 million slopes (€ 860,000) from 32 ATMs

Within a single night, attackers stole 3.8 million slopes (€ 860,000) from 32 ATMs that belong to Romania bank Raiffeisen in the year 2016.Attackers...

OlympicDestroyer – A Highly Sophisticated Cyber Attack by Lazarus Hacking Group

A Sophisticated cyber attack has been reported already that targeted against the   Pyeongchang Winter Olympics infrastructure using OlympicDestroyer Malware by Lazarus Hacking Group.This clever...

Shadow Brokers Leaked NSA Document Contains Sophisticated Hacking Tools to Tracks Other Country Hackers

A year ago, a well known hacking group called "Shadow Brokers" Leaked tons of NSA hacking Dump that contains a Zero-day exploit to install...

Facebook Owned Onavo VPN Collects User Data Even it is Turned Off

Facebook launched a free VPN program Onavo Protect for Android and iPhone to boost the user privacy and to keep the information secure. But...

Google Released Security Update for Android and Fixed 16 Critical Vulnerabilities

Google Released a security update for Android Devices and fixed 16 critical vulnerabilities that affected the recent Android versions.All the vulnerabilities fixed under the...