Thursday, February 20, 2025

Cyber Security News

Check Point Software

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

0
Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research and Development (R&D) Centre in Bengaluru, India.This initiative, unveiled...
Ivanti

PoC Exploit Released for Ivanti Endpoint Manager Vulnerabilities

0
A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could allow unauthenticated attackers to exploit machine account credentials for...
Ransomware Trends

Ransomware Trends 2025 – What’s new

0
As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale.The ransomware ecosystem has adapted to previous law enforcement...
fake job interview

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

0
ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group known as DeceptiveDevelopment, active since early 20241.The cybercriminals...
Bookworm Malware

New Bookworm Malware Using SLL Sideloading Technique To Windows

0
Cybersecurity researchers from Palo Alto Networks' Unit 42 disclosed the resurgence of the Bookworm malware, which has been linked to the Stately Taurus threat...
DriverEasy Malware

Fake Chrome Update Delivers DriverEasy Malware by Abusing Dropbox

0
A recent investigation has uncovered a malicious application, DriverEasy, masquerading as a legitimate Google Chrome update to steal user credentials.The malware leverages Dropbox's...

Rhadamanthys Infostealer Uses Microsoft Management Console to Spread Malware

0
Cybersecurity experts have raised alarms about the Rhadamanthys Infostealer, a sophisticated malware now being distributed through Microsoft Management Console (MMC) files with the MSC...
SIEM as a Service

Recent News

Apache Fineract SQL Injection Vulnerability Allows Malicious Data Injection

0
The Apache Software Foundation has disclosed a critical SQL injection vulnerability in its widely utilized financial platform, Apache Fineract.The flaw, tracked as CVE-2024-32838, affects multiple...
LLM Vulnerability

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation

0
A significant vulnerability has been identified in large language models (LLMs) such as ChatGPT, raising concerns over their susceptibility to adversarial attacks.Researchers have...
Ivanti

PoC Exploit Released for Ivanti Endpoint Manager Vulnerabilities

0
A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could allow unauthenticated attackers to exploit machine account credentials for...

Rhadamanthys Infostealer Uses Microsoft Management Console to Spread Malware

0
Cybersecurity experts have raised alarms about the Rhadamanthys Infostealer, a sophisticated malware now being distributed through Microsoft Management Console (MMC) files with the MSC...

Russian Hackers Target Signal Messenger Users to Steal Sensitive Data

0
Russian state-aligned threat actors have intensified their efforts to compromise Signal Messenger accounts, targeting individuals of strategic interest, according to the Google Threat Intelligence...
Credit Card Stealer

Cybercriminals Embedded Credit Card Stealer Script Within <img> Tag

0
Cybersecurity researchers have uncovered a new MageCart malware campaign targeting e-commerce websites running on the Magento platform.This attack exploits <img> HTML tags to...

Dutch Authorities Dismantle Network of 127 Command-and-Control Servers

0
Dutch police and the Public Prosecution Service have taken down a network of 127 command-and-control servers.This network was operated by ZServers/XHost, a so-called bulletproof...
Gmail Apps

Malware-Infected Signal, Line, and Gmail Apps Alter System Defenses

0
A recent cybersecurity analysis has uncovered a campaign targeting Chinese-speaking users through malicious installers of popular applications such as Signal, Line, and Gmail.These...
WordPress Sites

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

0
Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable remote code execution (RCE).These attacks exploit vulnerabilities in WordPress...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary