Tuesday, February 11, 2025

Cyber Security News

Fortinet Zero-Day

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

0
Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication bypass vulnerability (CVE-2025-24472) affecting its FortiOS and FortiProxy products.This...

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

0
Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing a wide range of vulnerabilities across its products and services.This...
Entra ID Accounts

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

0
Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the risks associated with unauthorized hard deletions of user accounts.This...
Single-Bit Fault Injection

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

0
The realm of fault injection attacks has long intrigued researchers and security professionals.Among these, single-bit fault injection, a technique that seeks to manipulate...
Satellite

Satellite Weather Software Vulnerabilities Let Attackers Execute Code Remotely

0
IBL Software Engineering has disclosed a significant security vulnerability, identified as CVE-2025-1077, affecting its Visual Weather software and derivative products, including Aero Weather, Satellite...

OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia

0
OpenAI, the organization behind ChatGPT and other advanced AI tools, is making significant strides in its efforts to reduce its dependency on Nvidia by...

New York Bans DeepSeek Over Potential Data Risks

0
 New York Governor Kathy Hochul announced that the state has banned the use of the China-based AI startup DeepSeek on government-issued devices and networks.The...
SIEM as a Service

Recent News

Exploit ASP.NET Machine Keys to hack IIS

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

0
Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks exploiting publicly disclosed ASP.NET machine keys to compromise ISS web...

DeepSeek’s New Jailbreak Method Reveals Full System Prompt

0
The Wallarm Security Research Team unveiled a new jailbreak method targeting DeepSeek, a cutting-edge AI model making waves in the global market.This breakthrough has...
Android & iOS Apps

Malicious Android & iOS Apps Downloaded Over 242,000 Times, Stealing Crypto Recovery Keys

0
A sophisticated malware campaign, dubbed SparkCat, has infiltrated Google Play and Apple’s App Store, marking the first known instance of an optical character recognition...
Indian banks

New Banking Attacking Users of Indian banks to Steal Aadhar, PAN, ATM & Credit...

0
A sophisticated malware campaign, dubbed "FatBoyPanel," has been uncovered by cybersecurity researchers, targeting users of Indian banks.This campaign, consisting of nearly 900 malware...

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

0
Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their alleged involvement in ransomware operations that inflicted global losses exceeding...
Abyss Locker Ransomware

Abyss Locker Ransomware Attacking Critical Network Devices including ESXi servers

0
The Abyss Locker ransomware, a relatively new but highly disruptive cyber threat, has been actively targeting critical network devices, including VMware ESXi servers, since...

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

0
United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all encrypted content stored in its iCloud service.The demand, issued...
IIS vulnerability

Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access

0
In a concerning revelation, cybersecurity firm eSentire’s Threat Response Unit (TRU) has detected active exploitation of a six-year-old vulnerability, CVE-2019-18935, in Progress Telerik UI...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

0
A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious cybersecurity concerns.Identified as CVE-2024-12754 and tracked under ZDI-24-1711, this flaw...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary