Cyber Security News

Critical Flaw In Apple Ecosystems Let Attackers Gain Unauthorized Access

Hackers go for Apple due to its massive user base along with rich customers, including business people and managers who…

2 days ago

Hackers Exploiting Linux SSH Services to Deploy Malware

SSH and RDP provide remote access to server machines (Linux and Windows respectively) for administration. Both protocols are vulnerable to…

2 days ago

Firefox 127 Released With patch for 15 Vulnerabilities

Mozilla has released Firefox 127, addressing 15 security vulnerabilities, some of which have been rated as high impact. This update…

2 days ago

Charon Android Botnet Made a Comeback With New Weapons

The notorious Charon Android Botnet has resurfaced with enhanced capabilities, according to a threat actor's announcement on a popular cybercrime…

2 days ago

Pure Storage Data Breach Following Snowflake Hack: LDAP Usernames, Email Addresses Exposed

Pure Storage has confirmed that a third party temporarily gained unauthorized access to a Snowflake data analytics workspace. This workspace…

2 days ago

Cleveland City Closes Offices Following Attack on IT Systems

Cleveland City Hall and Erieview offices will remain closed for a second consecutive day, June 11, as officials continue investigating a significant “cyber event” that has disrupted city operations. A…

2 days ago

Remcos RAT Distributed As UUEncoding (UUE) File To Steal Logins

Researchers identified a campaign distributing Remcos RAT, a Remote Access Trojan, where the attack uses phishing emails disguised as legitimate…

3 days ago

SSLoad Malware Employs MSI Installer To Kick-Start Delivery Chain

Malware distributors use MSI installers as Windows OS already trusts them to run with administrative rights by bypassing security controls.…

3 days ago

Chinese Hackers using New Noodle RAT to Attack Linux Servers

Cybersecurity experts have identified a new type of malware called "Noodle RAT," which Chinese-speaking hacker groups use to target Linux…

3 days ago

Hackers Weaponizing MSC Files In Targeted Attack Campaign

Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that…

3 days ago