Thursday, February 13, 2025

Cyber Security News

RedNote App Security Flaw Exposes User Files on iOS and Android Devices

0
Serious security vulnerabilities have been uncovered in the popular social media and content-sharing app, RedNote, compromising the privacy and security of millions of users...
Winnti Hackers

Winnti Hackers Attacking Japanese Organisations with New Malware

0
The China-based Advanced Persistent Threat (APT) group known as the Winnti Group, also referred to as APT41, has launched a new cyberattack campaign targeting...
DeepSeek

Threat Actors Exploiting DeepSeek’s Popularity to Deploy Malware

0
The meteoric rise of DeepSeek, a Chinese AI startup, has not only disrupted the AI sector but also attracted the attention of cybercriminals.Following...
APT43 Hackers

APT43 Hackers Targeting Academic Institutions Using Exposed Credentials

0
APT43, also known by aliases such as Black Banshee, Emerald Sleet, and Kimsuky, is a North Korean state-sponsored cyber threat actor linked to the...
Microsoft Key Management Service (KMS)

Russian Hackers Leverages Weaponized Microsoft Key Management Service (KMS) to Hack Windows Systems

0
In a calculated cyber-espionage campaign, the Russian state-sponsored hacking group Sandworm (APT44), linked to the GRU (Russia’s Main Intelligence Directorate), has been exploiting pirated...

Critical Vulnerability in Crowdstrike Falcon Sensor for Linux Enables TLS MiTM Exploits

0
CrowdStrike has disclosed a critical vulnerability (CVE-2025-1146) in its Falcon Sensor for Linux, its Falcon Kubernetes Admission Controller, and its Falcon Container Sensor.This flaw...

Amazon Machine Image Vulnerability Allows Hackers to Publish Fake Resources

0
 A new security vulnerability targeting Amazon Machine Images (AMIs) has emerged, exposing organizations and users to potential exploitation.Dubbed the "whoAMI name confusion attack," this...
SIEM as a Service

Recent News

Gcore Radar Report Reveals 56% Year-on-year Increase in DDoS Attacks

Gcore Radar Report Reveals 56% Year-on-year Increase in DDoS Attacks

0
Gcore, the global provider of edge AI, cloud, network, and security solutions has released its Q3-Q4 2024 Radar report on DDoS attack trends.The findings...
Facebook

New Facebook Fake Copyright Notices to Steal Your FB Accounts

0
A newly discovered phishing campaign is using fake Facebook copyright infringement notices to trick users into divulging their credentials, potentially compromising business accounts.Phishing...
XE Hacker Group

XE Hacker Group Exploiting Veracore 0-Day’s to Deploy Malware & Steal Credit Card Details

0
The XE Group, a sophisticated Vietnamese-origin cybercrime organization active since 2013, has escalated its operations by exploiting two zero-day vulnerabilities in VeraCore software, CVE-2024-57968...
Fortinet Zero-Day

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

0
Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication bypass vulnerability (CVE-2025-24472) affecting its FortiOS and FortiProxy products.This...
SimpleHelp

Hackers Exploiting SimpleHelp Vulnerabilities to Deploy Malware on Systems

0
Cybercriminals are actively exploiting vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM) software to infiltrate networks, create unauthorized administrator accounts, and deploy malware, including...

DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption

0
DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app since its January 25 release—has been discovered to transmit sensitive...
Application Layer

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

0
A recent analysis of over one million malware samples by Picus Security has revealed a growing trend in the exploitation of application layer protocols...

7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities

0
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical 0-day vulnerability affecting the popular file compression utility, 7-Zip, to its Known...
Exploit ASP.NET Machine Keys to hack IIS

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

0
Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks exploiting publicly disclosed ASP.NET machine keys to compromise ISS web...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary