Thursday, February 13, 2025

Cyber Security News

Pyramid Pentesting Tool

Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications

0
Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to establish stealthy command-and-control (C2) communications.Originally designed as a post-exploitation...
Local communities

Threat Actors in Russia, China, and Iran Targeting Local communities in the U.S

0
Foreign adversaries, including Russia, China, and Iran, are intensifying their efforts to manipulate public opinion and destabilize local communities across the United States.These...
Phishing Attacks

New Phishing Attacks Abuses Webflow CDN & CAPTCHAs to Steal Credit Card details

0
Netskope Threat Labs has uncovered a sophisticated phishing campaign targeting users across various industries, including technology, manufacturing, and banking.This campaign, active since mid-2024,...

30,000 WordPress Sites Exposed to Exploitation via File Upload Vulnerability

0
A critical security vulnerability in the "Security & Malware scan by CleanTalk" plugin has left over 30,000 WordPress websites exposed to exploitation.The vulnerability, identified...

Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks

0
A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software (CVE-2024-0012) has raised significant concerns within the cybersecurity community.The attack,...

Widespread Exploitation of ThinkPHP and OwnCloud Flaws by Cybercriminals

0
 GreyNoise has detected a significant surge in exploitation activity targeting two vulnerabilities — CVE-2022-47945 and CVE-2023-49103.The alarming uptick in attacks underscores critical issues in...

Windows 11 Compression Features Pose libarchive Security Threats

0
Microsoft's ongoing efforts to enhance user experience in Windows 11 have introduced native support for a variety of new archive formats via the KB5031455...
SIEM as a Service

Recent News

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

0
Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their alleged involvement in ransomware operations that inflicted global losses exceeding...
Linux Kernel Bug

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

0
Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years, that could allow attackers to execute remote code.The flaw,...
Phishing Attacks

New Phishing Attacks Abuses Webflow CDN & CAPTCHAs to Steal Credit Card details

0
Netskope Threat Labs has uncovered a sophisticated phishing campaign targeting users across various industries, including technology, manufacturing, and banking.This campaign, active since mid-2024,...
Nova Stealer

Beware of Nova Stealer Malware Sold for $50 on Hacking Forums

0
The cybersecurity landscape faces a new challenge with the emergence of Nova Stealer, a malware marketed under the Malware-as-a-Service (MaaS) model.Priced as low...
Single-Bit Fault Injection

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

0
The realm of fault injection attacks has long intrigued researchers and security professionals.Among these, single-bit fault injection, a technique that seeks to manipulate...
MITRE ATT&CK tags

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

0
The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to combat emerging threats.In response, Proofpoint's Emerging Threats (ET) team...
BYOTB Attack

New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal

0
A recent cybersecurity presentation at BSides London 2024 has unveiled a sophisticated attack technique known as Bring Your Own Trusted Binary (BYOTB).This method...

7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities

0
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical 0-day vulnerability affecting the popular file compression utility, 7-Zip, to its Known...
Video Attachments

Hackers Leveraging Image & Video Attachments to Deliver Malware

0
Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques like steganography and social engineering.These methods allow attackers to...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary