Thursday, February 13, 2025

Cyber Security News

Critical Chrome Flaw Allows Attackers to Remotely Execute Code

0
Google has released an urgent update for its Chrome browser to address a critical security vulnerability that could allow attackers to remotely execute malicious...

Global IoT Data Leak Exposes 2.7 Billion Records and Wi-Fi Passwords Worldwide

0
A massive security lapse has exposed over 2.7 billion records, including sensitive Wi-Fi credentials, device information, and user details, raising global concerns over IoT...

Palo Alto PAN-OS Zero-Day Flaw Allows Attackers to Bypass Web Interface Authentication

0
Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS software (CVE-2025-0108), allowing attackers to bypass authentication on the management web interface.With a...
MITRE ATT&CK tags

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

0
The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to combat emerging threats.In response, Proofpoint's Emerging Threats (ET) team...
Ivanti Connect Secure

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

0
In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability in Ivanti Connect Secure (ICS) appliances, tracked as CVE-2025-0282.This...
ZeroLogon Ransomware

ZeroLogon Ransomware Exploits Windows AD to Hijack Domain Controller Access

0
A newly intensified wave of ransomware attacks has surfaced, leveraging the infamous ZeroLogon vulnerability (CVE-2020-1472) to compromise Windows Active Directory (AD) domain controllers.This...
Cl0p Ransomware

Cl0p Ransomware Hide Itself on Compromised Networks After Exfiltrate the Data

0
The Cl0p ransomware group, a prominent player in the cybercrime landscape since 2019, has intensified its operations by employing advanced techniques to remain undetected...
SIEM as a Service

Recent News

IllusionCAPTCHA

Enhanced IllusionCAPTCHA: Advanced Protection Against AI-Powered CAPTCHA Attacks

0
As AI technologies continue to evolve, traditional CAPTCHA systems face increasing vulnerabilities.Recent studies reveal that advanced AI models, such as multimodal large language...
Exploit ASP.NET Machine Keys to hack IIS

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

0
Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks exploiting publicly disclosed ASP.NET machine keys to compromise ISS web...
MITRE ATT&CK tags

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

0
The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to combat emerging threats.In response, Proofpoint's Emerging Threats (ET) team...
Cl0p Ransomware

Cl0p Ransomware Hide Itself on Compromised Networks After Exfiltrate the Data

0
The Cl0p ransomware group, a prominent player in the cybercrime landscape since 2019, has intensified its operations by employing advanced techniques to remain undetected...

Former Google Engineer Charged for Allegedly Stealing AI Secrets for China

0
A federal grand jury has indicted Linwei Ding, also known as Leon Ding, a former Google software engineer, on four counts of theft of...
ScreenConnect

Cybercriminals Abusing ScreenConnect RMM Tool for Persistent Access

0
Cybersecurity experts have identified an alarming trend of cybercriminals exploiting ConnectWise ScreenConnect, a widely-used Remote Monitoring and Management (RMM) tool, to establish persistent access...

7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities

0
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical 0-day vulnerability affecting the popular file compression utility, 7-Zip, to its Known...
Nova Stealer

Beware of Nova Stealer Malware Sold for $50 on Hacking Forums

0
The cybersecurity landscape faces a new challenge with the emergence of Nova Stealer, a malware marketed under the Malware-as-a-Service (MaaS) model.Priced as low...
Akira Ransomware

Akira Ransomware Dominates January 2025 as the Most Active Ransomware Threat

0
January 2025 marked a pivotal month in the ransomware landscape, with Akira emerging as the most active and dominant threat actor.The group was...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary