Trending Now
Cyber Security News
Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions of systems to potential remote code execution (RCE) and...
Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate tools. The threat actor,...
BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial sample (MD5 14f6c034af7322156e62a6c961106a8c) provided valuable insights into its version...
Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications
A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which secretly collected sensitive user data, including installed app package...
Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide
The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees in critical sectors like nuclear energy, which involves distributing...
New Python NodeStealer Attacking Facebook Business To Steal Login Credentials
NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets Facebook Ads Manager accounts, stealing sensitive financial and business...
DigiEver IoT Devices Exploited To Deliver Mirai-based Malware
A new Mirai-based botnet, "Hail Cock Botnet," has been exploiting vulnerable IoT devices, including DigiEver DVRs and TP-Link devices with CVE-2023-1389.The botnet, active since...
Hackers Exploiting PLC Controllers In US Water Management System To Gain Remote Access
A joint Cybersecurity Advisory (CSA) warns of ongoing exploitation attempts by Iranian Islamic Revolutionary Guard Corps (IRGC)-affiliated cyber actors using the online persona "CyberAv3ngers." These...
New Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver Malware
Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT groups and ransomware gangs. While...
Recent News
Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace
Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability of the platform to supply chain attacks similar to...
CISA Proposes National Cyber Incident Response Plan
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National Cyber Incident Response Plan (NCIRP), inviting public feedback on...
North Korean Hackers Stolen $2.2 Billion from Crypto Platforms in 2024
North Korean hackers are estimated to have stolen a staggering $2.2 billion in 2024, up 21% from 2023.With advanced tactics and increasing sophistication,...
Critical Chrome Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely
Google has released a new security update on the Stable channel, bringing Chrome to version 131.0.6778.204/.205 for Windows and Mac and 131.0.6778.204 for Linux.This update addresses...
Hackers Exploit Linux SSH Servers Using Screen & hping3 Tools With “cShell” Bot
The AhnLab Security Intelligence Center (ASEC) has detected a new strain of malware targeting poorly protected Linux SSH servers.This malware, named "cShell," exploits existing...
Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions of systems to potential remote code execution (RCE) and...
17M Patient Records Stolen in Ransomware Attack on Three California Hospitals
A staggering 17 million patient records, containing sensitive personal and medical information, have been stolen in a devastating ransomware attack on PIH Health.The cyberattack,...
New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials
The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. Delivered as attachments disguised as archives or Microsoft 365 files,...
CISA Releases Eight New ICS Advisories to Defend Cyber Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued eight detailed advisories on vulnerabilities affecting Industrial Control Systems (ICS).These vulnerabilities impact critical software and...
Most Popular
- Acquisition
- Adobe
- Adware
- Amazon AWS
- AMD
- Android
- Anti Virus
- Antimalware
- Antispoofing
- ANY RUN
- Apple
- Artificial Intelligence
- Avast
- AWS
- Azure
- Backdoor
- Bitcoin
- Bluetooth
- Botnet
- Buffer over flow
- Bug Bounty
- Business
- ChatGPT
- Checklist
- Chrome
- Cisco
- Cloud
- Computer Security
- Course
- CPU
- Cross site Scripting
- cryptocurrency
- Cryptocurrency hack
- CVE/vulnerability
- Cyber AI
- Cyber Attack
- Cyber Crime
- cyber security
- Cyber security Course
- Cyber Security News
- Cyber Security Resources
- Dark Web
- Data Breach
- Data Governance
- DDOS
- Deals
- DNS
- Education
- Email Security
- Exploit
- Exploitation Tools
- Extratorrents
- Featured
- Firefox
- Firefox News
- Firewall
- Forensics Tools
- game
- Gmail
- Google dorks
- Governance
- Hacking Books
- Hacks
- Hardware Hacking
- HBO
- IIS
- Incident Response
- Information Gathering
- Information Security Risks
- Infosec- Resources
- Intel
- Internet
- iOS
- IoT
- IT
- KALI
- Kali Linux
- Kickass Torrents
- Law
- Legal
- Linux
- Linux malware
- Load balancer
- macOS
- Maintaining Access
- Malware
- Microsoft
- minecraft
- Mobile Attacks
- Network Pentesting
- Network Security
- Network security key
- New Post
- News
- OWASP - Top 10
- Password
- Password Attacks
More