Wednesday, February 12, 2025

Cyber Security News

Researchers Breach Software Supply Chain and Secure $50K Bug Bounty

0
A duo of cybersecurity researchers uncovered a critical vulnerability in a software supply chain, landing them an extraordinary $50,500 bug bounty.The exploit, described as...

Hackers Manipulate Users Into Running PowerShell as Admin to Exploit Windows

0
Microsoft Threat Intelligence has exposed a novel cyberattack method employed by the North Korean state-sponsored hacking group, Emerald Sleet (also known as Kimsuky or...

Windows Driver Zero-Day Vulnerability Let Hackers Remotely Gain System Access

0
Microsoft has confirmed the discovery of a significant zero-day vulnerability, tracked as CVE-2025-21418, in the Windows Ancillary Function Driver for WinSock.This flaw, categorized as an Elevation...
FortiOS & FortiProxy

FortiOS & FortiProxy Vulnerability Allows Attackers Firewall Hijacks to Gain Super Admin Access

0
A critical vulnerability in Fortinet's FortiOS and FortiProxy products has been identified, enabling attackers to bypass authentication and gain super-admin access.The flaw, classified...
DoS Attack

Fortinet’s FortiOS Vulnerabilities Allow Attackers Trigger RCE and Launch DoS Attack

0
Fortinet’s FortiOS, the operating system powering its VPN and firewall appliances, has been found vulnerable to multiple security flaws that could allow attackers to...

0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files Remotely

0
A newly discovered 0-day vulnerability in Windows Storage has sent shockwaves through the cybersecurity community.Identified as CVE-2025-21391, this critical flaw allows attackers to elevate privilege...
I2P Network

Ratatouille Malware Bypass UAC Control & Exploits I2P Network to Launch Cyber Attacks

0
A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity community due to its sophisticated methods of bypassing User Account...
SIEM as a Service

Recent News

OpenAI Data Breach – Threat Actor Allegedly Claims 20 Million Logins for Sale

0
Threat actors from dark web forums claim to have stolen and leaked 20 million OpenAI user login credentials, potentially making OpenAI the latest high-profile...

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

0
A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat to IT administrators and developers worldwide.The vulnerability enables attackers to...

Logsign Vulnerability Allows Remote Attackers to Bypass Authentication

0
A critical security vulnerability has been identified and disclosed in the Logsign Unified SecOps Platform, allowing remote attackers to bypass authentication mechanisms.The vulnerability tracked...
Quishing

Quishing via QR Codes Emerging as a Top Attack Vector Used by Hackers

0
QR codes, once a symbol of convenience and security in digital interactions, have become a significant target for cybercriminals.The Rise of Fake QR...
Exploit ASP.NET Machine Keys to hack IIS

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

0
Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks exploiting publicly disclosed ASP.NET machine keys to compromise ISS web...

DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption

0
DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app since its January 25 release—has been discovered to transmit sensitive...
Hugging Face Platform

Developers Beware! Malicious ML Models Found on Hugging Face Platform

0
In a concerning development for the machine learning (ML) community, researchers from ReversingLabs have uncovered malicious ML models on the Hugging Face platform, a...
North Korean Hackers

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures

0
Recent research has highlighted the increasingly sophisticated tactics, techniques, and procedures (TTPs) employed by North Korean state-sponsored hackers.These cyber actors have demonstrated a...

Former Google Engineer Charged for Allegedly Stealing AI Secrets for China

0
A federal grand jury has indicted Linwei Ding, also known as Leon Ding, a former Google software engineer, on four counts of theft of...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary