Thursday, November 30, 2023

Hot News

Hackers Using Weaponized Invoice

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

0
Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. This tactic aims to deceive...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

0
The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group Lazarus was using it to...

CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers

0
In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded in Water and Wastewater...
Zyxel Command Injection Flaws

Zyxel Command Injection Flaws Let Attackers Run OS Commands

0
Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor to execute system commands...

North Korean Hackers Attacking macOS Using Weaponized Documents

0
Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code.All these documents contain malicious code or macros,...
Popular Websites weak passwords

Most Popular Websites Still Allow Users To Have Weak Passwords

0
The latest analysis shows that tens of millions of people are creating weak passwords on three of the four most popular websites in the...
Sixth Chrome Zero-Day Vulnerability

Chrome Zero-Day Vulnerability That Exploited In The Wild

0
Google has fixed the sixth Chrome zero-day bug that was exploited in the wild this year. The flaw, identified as CVE-2023-6345, is classified as an...

Iranian Mobile Banking Malware Steal Login Credentials & Steal OTP Codes

0
An Android malware campaign was previously discovered that distributed banking trojans targeting four major Iranian Banks: Bank Mellat, Bank Saderat, Resalat Bank, and Central...

BLUFFS: Six New Attacks that Break Secrecy of Bluetooth Sessions

0
Six novel Bluetooth attack methods have been discovered, which were named BLUFFS (Bluetooth Forward and Future Secrecy) attacks. These attacks could enable threat actors...

Google Workspace’s Design Flaw Allows Attacker Unauthorized Access

0
Recent years saw a surge in cloud tech adoption, highlighting the efficiency through tools like Google's Domain-Wide Delegation. It enables GCP (Google Cloud Platform) identities...

Serial ‘SIM Swapper’ Sentenced to Eight Years in Prison

0
In a digital age marred by deceit, 25-year-old Amir Hossein Golshan stands as a testament to the dark underbelly of cyberspace. Hailing from downtown Los...

Design Flaw in Domain-Wide Delegation Could Leave Google Workspace Vulnerable to Takeover – Hunters

0
BOSTON, MASS. and TEL AVIV, ISRAEL, November 28, 2023 - A severe design flaw in Google Workspace's domain-wide delegation feature discovered by threat hunting...

NewsLetter

          Sign up for Daily Updates 

[email-subscribers namefield=”YES” desc=”” group=”Public”]

Website

Penetration Testing