Wednesday, February 12, 2025

Cyber Security News

FortiOS & FortiProxy

FortiOS & FortiProxy Vulnerability Allows Attackers Firewall Hijacks to Gain Super Admin Access

0
A critical vulnerability in Fortinet's FortiOS and FortiProxy products has been identified, enabling attackers to bypass authentication and gain super-admin access.The flaw, classified...
DoS Attack

Fortinet’s FortiOS Vulnerabilities Allow Attackers Trigger RCE and Launch DoS Attack

0
Fortinet’s FortiOS, the operating system powering its VPN and firewall appliances, has been found vulnerable to multiple security flaws that could allow attackers to...

0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files Remotely

0
A newly discovered 0-day vulnerability in Windows Storage has sent shockwaves through the cybersecurity community.Identified as CVE-2025-21391, this critical flaw allows attackers to elevate privilege...
I2P Network

Ratatouille Malware Bypass UAC Control & Exploits I2P Network to Launch Cyber Attacks

0
A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity community due to its sophisticated methods of bypassing User Account...
Sandworm APT Hackers

Sandworm APT Hackers Weaponize Microsoft KMS Activation Tools To Compromise Windows

0
In a sophisticated cyber-espionage operation, the Russian state-sponsored hacking group Sandworm (APT44), linked to the GRU (Russia's Main Intelligence Directorate), has been exploiting pirated...

Hackers Can Exploit “Wormable” Windows LDAP RCE Vulnerability for Remote Attacks

0
A critical new vulnerability in Microsoft’s Windows Lightweight Directory Access Protocol (LDAP), tagged as CVE-2025-21376, has recently come to light, raising alarms across global...

Google Chrome’s Safe Browsing Now Protects 1 Billion Users Worldwide

0
Google's Safe Browsing technology now ensures enhanced protection for over 1 billion Chrome users worldwide.Launched in 2005, Safe Browsing is a robust system designed...
SIEM as a Service

Recent News

Chinese CDN

Chinese CDN Exploiting AWS & Microsoft Cloud to Host Malicious Websites

0
A recent investigation by cybersecurity firm Silent Push has revealed how a China-linked Content Delivery Network (CDN), known as FUNNULL, is exploiting major cloud...

0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files Remotely

0
A newly discovered 0-day vulnerability in Windows Storage has sent shockwaves through the cybersecurity community.Identified as CVE-2025-21391, this critical flaw allows attackers to elevate privilege...
macOS Users

Password Stealing Malware Attacking macOS Users Increasing Rapidly

0
In a concerning trend, macOS users are facing an unprecedented rise in password-stealing malware attacks.Recent cybersecurity reports reveal a 101% surge in macOS infostealers...

Marvel Game Vulnerability Exposes PCs & PS5s to Remote Takeover Attacks

0
A severe security vulnerability has been uncovered in the popular video game Marvel Rivals, raising major concerns for both PC and PlayStation 5 players.The exploit,...
Ghidra 11.3 Released

Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool

0
The National Security Agency (NSA) has officially released Ghidra 11.3, the latest iteration of its open-source software reverse engineering (SRE) framework.Known for its...

Massive Brute Force Attack Launched With 2.8 Million IPs To Hack VPN & Firewall...

0
Massive brute force attacks targeting VPNs and firewalls have surged in recent weeks, with cybercriminals using as many as 2.8 million unique IP addresses...

Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

0
A high-severity security vulnerability (CVE-2024-12797) has been identified in OpenSSL, one of the most widely used cryptographic libraries.The flaw allows attackers to exploit a...
Facebook Phishing Attack

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

0
A newly discovered phishing campaign targeting Facebook users has been identified by researchers at Check Point Software Technologies.The attack, which began in late...
Facebook

New Facebook Fake Copyright Notices to Steal Your FB Accounts

0
A newly discovered phishing campaign is using fake Facebook copyright infringement notices to trick users into divulging their credentials, potentially compromising business accounts.Phishing...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary