Hot News

Hackers Steal User’s Database From European Telecommunications Standards Institute

0
The European Telecommunications Standards Institute (ETSI) has uncovered a data breach in which threat actors obtained a database holding a list of portal users.The...

Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code

0
A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious code and execute arbitrary...
LightSpy APT Attacking WeChat Users

LightSpy APT Attacking WeChat Users to Steal Payment Data

0
LightSpy malware, responsible for a watering hole attack conducted against iOS users in Hong Kong, has been discovered to be embedded with Android implant...

Lazarus Tricking Employees with Trojanized Coding Challenges

0
Lazarus group has been recently discovered to have targeted an Aerospace company in Spain, which involved deploying several tools, including an undocumented backdoor named...
Hackers Bypass Cloudflare

Hackers Bypass Cloudflare Firewall and DDoS Protections using Cloudflare

0
Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers to unforeseen risks. A recent...

MadPot: AWS Honeypot to Disrupt Threat Actors

0
In the realm of cybersecurity, the battle against threat actors never stops. With its vast cloud infrastructure, Amazon Web Services (AWS) is at the...

APT34 Employs Weaponized Word Documents to Deploy New Malware Strain

0
APT34 is a secretive cyberespionage group specializing in Middle East targets, known for gathering sensitive intelligence via spear phishing and advanced infiltration methods.The sophistication...

Budworm APT Attacking Telecoms Org With New Custom Tools

0
APT (Advanced Persistent Threat) actors are evolving at a rapid pace, continually enhancing their toolsets and tactics. They adapt quickly to security measures, leveraging advanced...

Malicious HDMI Cables Steals Photos, Videos, and Location Data

0
John Bumstead, who works for a company called 404Media that fixes and sells used electronics, found an iPhone-to-HDMI adapter that seemed normal at first....

Cisco IOS Software Zero-day Exploited in Attacks

0
Cisco has issued fixes to address a vulnerability in the GET VPN feature of IOS and IOS XE software that has been exploited in...

Progress Software Warns of Critical Vulnerability in WS_FTP Server

0
Multiple vulnerabilities have been discovered in Progress’s WS_FTP, which include .NET deserialization, directory traversal, reflected cross-site scripting (XSS), SQL injection, stored cross-site scripting, cross-site...

Hackers Inject Malicious Ads into GPT-4 Powered Bing Chat

0
In February 2023, Microsoft unveiled its revolutionary AI-assisted search engine, Bing Chat, driven by OpenAI's cutting-edge GPT-4 technology. This announcement marked a notable event in...

NewsLetter

          Sign up for Daily Updates 

[email-subscribers namefield=”YES” desc=”” group=”Public”]

Website
CSN

Penetration Testing