Friday, September 13, 2024
Tag:

Cyber Security News

Docker Desktop Vulnerabilities Let Attackers Execute Remote Code

Docker has addressed critical vulnerabilities in Docker Desktop that could allow attackers to execute remote code.These vulnerabilities, identified as CVE-2024-8695 and CVE-2024-8696, highlight...

Fortinet Confirms Data Breach Following Hacker’s Claim of 440GB Data Theft

Fortinet, a leading cybersecurity firm, has confirmed a data breach involving a third-party cloud service after a hacker, known by the alias "Fortibitch," claimed...

Critical Vulnerabilities in JPEG 2000 Library Let Attackers Execute Remote Code

Exploiting memory corruption vulnerabilities in server-side software often requires knowledge of the binary and environment, which limits the attack surface, especially for unknown binaries...

Hackers Mimic Google, Microsoft & Amazon Domains for Phishing Attacks

Phishing remains a significant concern for both individuals and organizations. Recent findings from ThreatLabz have highlighted the alarming prevalence of phishing attacks targeting major...

Siemens Industrial Edge Management Vulnerable to Authorization Bypass Attacks

Siemens ProductCERT has disclosed a critical vulnerability in its Industrial Edge Management systems.The vulnerability, identified as CVE-2024-45032, poses a significant risk by allowing...

New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR

RansomHub has recently employed a novel attack method utilizing TDSSKiller and LaZagne, where TDSSKiller, traditionally used to disable EDR systems, was deployed to compromise...

Adobe Security Update, Multiple Vulnerabilities Patched

Adobe has issued a crucial security update for its Acrobat and Reader software on Windows and macOS platforms.This update, identified as APSB24-70, addresses...

CISA Issues Warning About Three Actively Exploited Vulnerabilities in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about three critical vulnerabilities currently being exploited in the wild.These vulnerabilities affect...