Cyber Security News

Tor Browser 14.5.1 Released with Enhanced Security and New FeaturesTor Browser 14.5.1 Released with Enhanced Security and New Features

Tor Browser 14.5.1 Released with Enhanced Security and New Features

The Tor Project has announced the official release of Tor Browser 14.5.1, introducing a host of security improvements and new…

5 days ago
Security Policy Development Codifying NIST CSF For Enterprise AdoptionSecurity Policy Development Codifying NIST CSF For Enterprise Adoption

Security Policy Development Codifying NIST CSF For Enterprise Adoption

The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) has become a fundamental reference for organizations aiming to…

6 days ago
Cato Networks macOS Client Vulnerability Enables Low-Privilege Code ExecutionCato Networks macOS Client Vulnerability Enables Low-Privilege Code Execution

Cato Networks macOS Client Vulnerability Enables Low-Privilege Code Execution

A critical vulnerability in Cato Networks’ widely used macOS VPN client has been disclosed, enabling attackers with limited access to…

6 days ago
TheWizards Deploy ‘Spellbinder Hacking Tool’ for Global Adversary-in-the-Middle AttackTheWizards Deploy ‘Spellbinder Hacking Tool’ for Global Adversary-in-the-Middle Attack

TheWizards Deploy ‘Spellbinder Hacking Tool’ for Global Adversary-in-the-Middle Attack

ESET researchers have uncovered sophisticated attack techniques employed by a China-aligned threat actor dubbed "TheWizards," which has been actively targeting…

6 days ago
SonicWALL Connect Tunnel Vulnerability Could Allow Attackers to Trigger DoS AttacksSonicWALL Connect Tunnel Vulnerability Could Allow Attackers to Trigger DoS Attacks

SonicWALL Connect Tunnel Vulnerability Could Allow Attackers to Trigger DoS Attacks

A newly disclosed vulnerability in SonicWall’s Connect Tunnel Windows Client could allow malicious actors to trigger denial-of-service (DoS) attacks or…

6 days ago
Researchers Uncovered RansomHub Operation and it’s Relation With Qilin RansomwareResearchers Uncovered RansomHub Operation and it’s Relation With Qilin Ransomware

Researchers Uncovered RansomHub Operation and it’s Relation With Qilin Ransomware

Security researchers have identified significant connections between two major ransomware-as-a-service (RaaS) operations, with evidence suggesting affiliates from the recently-disabled RansomHub…

6 days ago
Researchers Turned Azure Storage Wildcards into a Stealthy Internal SOCKS5 BackdoorResearchers Turned Azure Storage Wildcards into a Stealthy Internal SOCKS5 Backdoor

Researchers Turned Azure Storage Wildcards into a Stealthy Internal SOCKS5 Backdoor

Security researchers at Quarkslab have developed a new covert channel technique that exploits Microsoft's recommended Azure Storage firewall configurations to…

6 days ago
Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login RestrictionsMicrosoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

A newly disclosed vulnerability in Microsoft’s Telnet Server component is making headlines after researchers revealed that attackers could exploit the…

6 days ago
Firefox 138 Launches with Patches for Several High-Severity FlawsFirefox 138 Launches with Patches for Several High-Severity Flaws

Firefox 138 Launches with Patches for Several High-Severity Flaws

Mozilla has officially released Firefox 138, marking a significant update focused on user security. The new version addresses multiple high-severity…

6 days ago
Incident Response Playbooks – What Every CISO Should Have ReadyIncident Response Playbooks – What Every CISO Should Have Ready

Incident Response Playbooks – What Every CISO Should Have Ready

The Security Operations Center (SOC) is the nerve center of modern cybersecurity, responsible for detecting, analyzing, and responding to threats…

6 days ago