Tuesday, December 24, 2024
SIEM as a Service

Cyber Security News

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

0
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions of systems to potential remote code execution (RCE) and...

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

0
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate tools. The threat actor,...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

0
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial sample (MD5 14f6c034af7322156e62a6c961106a8c) provided valuable insights into its version...

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

0
A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which secretly collected sensitive user data, including installed app package...

Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

0
The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees in critical sectors like nuclear energy, which involves distributing...

New Python NodeStealer Attacking Facebook Business To Steal Login Credentials

0
NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets Facebook Ads Manager accounts, stealing sensitive financial and business...

DigiEver IoT Devices Exploited To Deliver Mirai-based Malware

0
A new Mirai-based botnet, "Hail Cock Botnet," has been exploiting vulnerable IoT devices, including DigiEver DVRs and TP-Link devices with CVE-2023-1389.The botnet, active since...

Hackers Exploiting PLC Controllers In US Water Management System To Gain Remote Access

0
A joint Cybersecurity Advisory (CSA) warns of ongoing exploitation attempts by Iranian Islamic Revolutionary Guard Corps (IRGC)-affiliated cyber actors using the online persona "CyberAv3ngers." These...

New Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver Malware

0
Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT groups and ransomware gangs. While...

Recent News

Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace

0
Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability of the platform to supply chain attacks similar to...

CISA Proposes National Cyber Incident Response Plan

0
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National Cyber Incident Response Plan (NCIRP), inviting public feedback on...

North Korean Hackers Stolen $2.2 Billion from Crypto Platforms in 2024

0
North Korean hackers are estimated to have stolen a staggering $2.2 billion in 2024, up 21% from 2023.With advanced tactics and increasing sophistication,...

Critical Chrome Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

0
Google has released a new security update on the Stable channel, bringing Chrome to version 131.0.6778.204/.205 for Windows and Mac and 131.0.6778.204 for Linux.This update addresses...

Hackers Exploit Linux SSH Servers Using Screen & hping3 Tools With “cShell” Bot

0
The AhnLab Security Intelligence Center (ASEC) has detected a new strain of malware targeting poorly protected Linux SSH servers.This malware, named "cShell," exploits existing...

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

0
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions of systems to potential remote code execution (RCE) and...

17M Patient Records Stolen in Ransomware Attack on Three California Hospitals

0
A staggering 17 million patient records, containing sensitive personal and medical information, have been stolen in a devastating ransomware attack on PIH Health.The cyberattack,...

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

0
The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. Delivered as attachments disguised as archives or Microsoft 365 files,...

CISA Releases Eight New ICS Advisories to Defend Cyber Attacks

0
 The Cybersecurity and Infrastructure Security Agency (CISA) has issued eight detailed advisories on vulnerabilities affecting Industrial Control Systems (ICS).These vulnerabilities impact critical software and...
SIEM as a Service

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary