cyber security
Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars
Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day vulnerabilities that could allow attackers to gain full control over vehicle systems.These vulnerabilities, highlighted...
Cyber Attack
Pootry EDR Killer Malware Wipes Out Security Tools From Windows Machine
Windows drivers can be abused to bypass security measures. Attackers can exploit vulnerabilities in legitimate drivers or use stolen or forged digital signatures to...
Cyber Attack
TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs
Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making them easy to modify...
Cyber Attack
Hackers Using Dropbox And Google Docs To Deliver Orcinius MalwareÂ
A new Orcinius Trojan has been discovered, employing VBA Stomping to hide its infection. The multi-stage trojan uses Dropbox and Google Docs to stay...
Cyber Crime
Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information
A recent rise in data breaches from illegal Chinese OTT platforms exposes that user information, including names and financial details, is vulnerable to exploitation...
cyber security
Diamorphine Rootkit Exploiting Linux Systems In The Wild
Threat actors exploit Linux systems because they are prevalent in organizations that host servers, databases, and other important resources. Exploiting vulnerabilities in Linux systems allows...
cyber security
Developers Beware Of Malicious npm Package Delivers Sophisticated RAT
Hackers have multiple reasons for abusing malicious npm packages, as they can first use popular open-source libraries as a medium for distributing malware or...
CVE/vulnerability
Researchers Exploited Nexus Repository Using Directory Traversal Vulnerability
Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes.The widespread use of GitHub and the diverse range of codebases...
Cyber Security News
Critical Git Vulnerability Let Attackers Execute Remote Code : PoC Published
A critical remote code execution vulnerability has been discovered in the git clone which was assigned with CVE-2024-32002 and the severity has been given...
CVE/vulnerability
Linksys Router Flaw Let Attackers Perform Command Injection, PoC Released
Linksys routers were discovered with two vulnerabilities: CVE-2024-33788 and CVE-2024-33789.These vulnerabilities were associated with Command Injection on Linksys routers.The severity of these vulnerabilities...
Vulnerability
Palo Alto ZeroDay Exploited in The Wild Following PoC Release
Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified as CVE-2024-3400.This zero-day flaw, found in the GlobalProtect Gateway, is...