computer security

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi NetworksNearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch" (also known as APT28, Fancy…

5 months ago
DOJ Asks Google to Sell $20 Billion Worth Chrome to End MonopolyDOJ Asks Google to Sell $20 Billion Worth Chrome to End Monopoly

DOJ Asks Google to Sell $20 Billion Worth Chrome to End Monopoly

In a dramatic escalation of its antitrust lawsuit against Google, the U.S. Department of Justice (DOJ) has proposed sweeping changes…

5 months ago
Proofpoint’s Email Protection Let Attackers Send Millions Of Phishing EmailsProofpoint’s Email Protection Let Attackers Send Millions Of Phishing Emails

Proofpoint’s Email Protection Let Attackers Send Millions Of Phishing Emails

Hackers use phishing emails to mislead recipients into providing personal data like usernames, passwords, credit card numbers, or social security…

9 months ago
Water Sigbin Exploiting Oracle WebLogic Server FlawWater Sigbin Exploiting Oracle WebLogic Server Flaw

Water Sigbin Exploiting Oracle WebLogic Server Flaw

Water Sigbin (8220 Gang) exploits vulnerabilities (CVE-2017-3506, CVE-2023-21839) in Oracle WebLogic servers to deliver cryptocurrency miners using PowerShell scripts.  They…

10 months ago
Hackers Weaponizing Windows Shortcut Files for PhishingHackers Weaponizing Windows Shortcut Files for Phishing

Hackers Weaponizing Windows Shortcut Files for Phishing

LNK files, a shortcut file type in Windows OS, provide easy access to programs, folders, or websites. Created automatically during…

10 months ago
Chrome Security Update – Patch for 6 VulnerabilitiesChrome Security Update – Patch for 6 Vulnerabilities

Chrome Security Update – Patch for 6 Vulnerabilities

Google has announced a new update for the Chrome browser, rolling out version 126.0.6478.114/115 for Windows and Mac and 126.0.6478.114…

10 months ago
Hackers Weaponizing MSC Files In Targeted Attack CampaignHackers Weaponizing MSC Files In Targeted Attack Campaign

Hackers Weaponizing MSC Files In Targeted Attack Campaign

Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that…

11 months ago
Malicious PyPI & NPM Packages Attacking MacOS UsersMalicious PyPI & NPM Packages Attacking MacOS Users

Malicious PyPI & NPM Packages Attacking MacOS Users

Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users. These packages, found on the Python Package…

11 months ago
FortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing via Malicious PacketsFortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing via Malicious Packets

FortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing via Malicious Packets

A critical vulnerability has been discovered in Fortinet's FortiOS SSL-VPN and FortiProxy SSL-VPN. The flaw, identified as FG-IR-23-225, allows attackers…

11 months ago
Zscaler Concludes Investigation: Only Test Servers CompromisedZscaler Concludes Investigation: Only Test Servers Compromised

Zscaler Concludes Investigation: Only Test Servers Compromised

In a recent development, Zscaler Inc., a prominent cybersecurity firm, has concluded its investigation into a potential data breach initially…

11 months ago