Wednesday, February 12, 2025

Cyber Security News

MITRE ATT&CK tags

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

0
The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to combat emerging threats.In response, Proofpoint's Emerging Threats (ET) team...
Ivanti Connect Secure

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

0
In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability in Ivanti Connect Secure (ICS) appliances, tracked as CVE-2025-0282.This...
ZeroLogon Ransomware

ZeroLogon Ransomware Exploits Windows AD to Hijack Domain Controller Access

0
A newly intensified wave of ransomware attacks has surfaced, leveraging the infamous ZeroLogon vulnerability (CVE-2020-1472) to compromise Windows Active Directory (AD) domain controllers.This...
Cl0p Ransomware

Cl0p Ransomware Hide Itself on Compromised Networks After Exfiltrate the Data

0
The Cl0p ransomware group, a prominent player in the cybercrime landscape since 2019, has intensified its operations by employing advanced techniques to remain undetected...
SonicWall Firewalls

SonicWall Firewalls Exploit Hijack SSL VPN Sessions to Gain Networks Access

0
SonicWall firewalls running specific versions of SonicOS are vulnerable to a critical authentication bypass flaw, tracked as CVE-2024-53704, which allows attackers to hijack active...

Researchers Breach Software Supply Chain and Secure $50K Bug Bounty

0
A duo of cybersecurity researchers uncovered a critical vulnerability in a software supply chain, landing them an extraordinary $50,500 bug bounty.The exploit, described as...

Hackers Manipulate Users Into Running PowerShell as Admin to Exploit Windows

0
Microsoft Threat Intelligence has exposed a novel cyberattack method employed by the North Korean state-sponsored hacking group, Emerald Sleet (also known as Kimsuky or...
SIEM as a Service

Recent News

Authorities Arrested Hacker Who Compromised 40+ Organizations

0
Spanish authorities have arrested a hacker believed to be responsible for cyberattacks targeting over 40 public and private organizations globally.The suspect, apprehended on Tuesday...

MobSF Framework Zero-Day Vulnerability Allows Attackers to Trigger DoS in Scan Results

0
A recently discovered zero-day vulnerability in the Mobile Security Framework (MobSF) has raised alarms in the cybersecurity community.The vulnerability, which allows attackers to cause...
Sandworm APT Hackers

Sandworm APT Hackers Weaponize Microsoft KMS Activation Tools To Compromise Windows

0
In a sophisticated cyber-espionage operation, the Russian state-sponsored hacking group Sandworm (APT44), linked to the GRU (Russia's Main Intelligence Directorate), has been exploiting pirated...

New York Bans DeepSeek Over Potential Data Risks

0
 New York Governor Kathy Hochul announced that the state has banned the use of the China-based AI startup DeepSeek on government-issued devices and networks.The...

DeepSeek’s New Jailbreak Method Reveals Full System Prompt

0
The Wallarm Security Research Team unveiled a new jailbreak method targeting DeepSeek, a cutting-edge AI model making waves in the global market.This breakthrough has...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

0
A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious cybersecurity concerns.Identified as CVE-2024-12754 and tracked under ZDI-24-1711, this flaw...
North Korean Hackers

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures

0
Recent research has highlighted the increasingly sophisticated tactics, techniques, and procedures (TTPs) employed by North Korean state-sponsored hackers.These cyber actors have demonstrated a...
Facebook Phishing Attack

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

0
A newly discovered phishing campaign targeting Facebook users has been identified by researchers at Check Point Software Technologies.The attack, which began in late...
Lumma Stealer

Lumma Stealer Attacking Windows Users In India With Fake Captcha Pages

0
Cybersecurity experts are raising alarms over a new wave of attacks targeting Windows users in India, driven by the Lumma Stealer malware.This advanced...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary