Thursday, February 13, 2025

Cyber Security News

Wordpress

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

0
A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm, has intensified its cyber operations through a campaign dubbed BadPilot.This...
Seashell Blizzard’s Attacks

BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks

0
A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of the Russian state-sponsored hacking collective Seashell Blizzard, also known as...
Pyramid Pentesting Tool

Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications

0
Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to establish stealthy command-and-control (C2) communications.Originally designed as a post-exploitation...
Local communities

Threat Actors in Russia, China, and Iran Targeting Local communities in the U.S

0
Foreign adversaries, including Russia, China, and Iran, are intensifying their efforts to manipulate public opinion and destabilize local communities across the United States.These...
Phishing Attacks

New Phishing Attacks Abuses Webflow CDN & CAPTCHAs to Steal Credit Card details

0
Netskope Threat Labs has uncovered a sophisticated phishing campaign targeting users across various industries, including technology, manufacturing, and banking.This campaign, active since mid-2024,...

30,000 WordPress Sites Exposed to Exploitation via File Upload Vulnerability

0
A critical security vulnerability in the "Security & Malware scan by CleanTalk" plugin has left over 30,000 WordPress websites exposed to exploitation.The vulnerability, identified...

Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks

0
A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software (CVE-2024-0012) has raised significant concerns within the cybersecurity community.The attack,...
SIEM as a Service

Recent News

Windows Driver Zero-Day Vulnerability Let Hackers Remotely Gain System Access

0
Microsoft has confirmed the discovery of a significant zero-day vulnerability, tracked as CVE-2025-21418, in the Windows Ancillary Function Driver for WinSock.This flaw, categorized as an Elevation...
Hugging Face Platform

Developers Beware! Malicious ML Models Found on Hugging Face Platform

0
In a concerning development for the machine learning (ML) community, researchers from ReversingLabs have uncovered malicious ML models on the Hugging Face platform, a...
SHA256 Hash

SHA256 Hash Calculation from Data Chunks

0
The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity and authenticity.It processes input data in fixed-size chunks of...
Microsoft Graph API

New Malware Abuses Microsoft Graph API to Communicate via Outlook

0
A newly discovered malware, named FINALDRAFT, has been identified leveraging Microsoft Outlook as a command-and-control (C2) communication channel through the Microsoft Graph API.This...

Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks

0
Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks.According to the whoisxmlapi shared on the X, there has been...
DeepSeek

Threat Actors Exploiting DeepSeek’s Popularity to Deploy Malware

0
The meteoric rise of DeepSeek, a Chinese AI startup, has not only disrupted the AI sector but also attracted the attention of cybercriminals.Following...
NanoCore RAT

NanoCore RAT Attack Windows Using Task Scheduler to Captures keystrokes, screenshots

0
NanoCore, a notorious Remote Access Trojan (RAT), continues to pose a significant threat to Windows systems.This malware, known for its espionage capabilities and...

Critical Chrome Flaw Allows Attackers to Remotely Execute Code

0
Google has released an urgent update for its Chrome browser to address a critical security vulnerability that could allow attackers to remotely execute malicious...
Google Tag Managers

Hackers Exploiting Google Tag Managers to Steal Credit Card from eCommerce Sites

0
In a concerning development, cybercriminals are leveraging Google Tag Manager (GTM), a legitimate tool widely used by eCommerce websites, to deploy malicious scripts designed...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary