China-linked APT MURKY PANDA targets North American gov, tech & legal sectors, exploiting cloud flaws & stealing sensitive data.| Cyber Security News
An alleged threat actor has listed a Windows Zero-Day Remote Code Execution (RCE) exploit for sale, claiming it targets fully updated Windows 10, Windows 11, and Windows Server 2022 systems.| Cyber Security News
A sophisticated social engineering campaign by the EncryptHub threat group that combines impersonation tactics with technical exploitation to compromise corporate networks.| Cyber Security News
PS1Bot malware targets Windows via malvertising, using PowerShell+C# for stealthy info theft, modular design, and in-memory execution.| Cyber Security News
CISA has issued urgent warnings regarding two critical security vulnerabilities in N-able N-Central remote monitoring and management (RMM) software that are actively being exploited by threat actors.| Cyber Security News
Fake Ukrainian Web3 team lures job seekers via malicious NPM repo in interviews, stealing crypto wallets, browser data & personal info.| Cyber Security News
A critical security vulnerability in Fortinet FortiSIEM platform that allows unauthenticated attackers to execute arbitrary commands remotely.| Cyber Security News
EA’s Javelin anti-cheat blocked 330K cheating attempts in Battlefield 6 beta, using multi-layered defenses including Secure Boot.| Cyber Security News
Zoom has disclosed a critical vulnerability affecting multiple Windows-based clients, potentially allowing attackers to escalate privileges and compromise user systems.| Cyber Security News
Researchers have detected an unprecedented surge in brute-force attacks targeting Fortinet SSL VPN infrastructure, with over 780 unique IP addresses participating in coordinated assault campaigns.| Cyber Security News
A massive leak of internal tooling, backdoors, and intelligence-gathering artifacts attributed to North Korea’s state-sponsored APT group Kimsuky has been published online by presumed insiders.| Cyber Security News
A severe flaw in a major automaker’s dealer portal that allowed unauthorized attackers to register for dealer accounts, escalate privileges to a national administrator, and ultimately control vehicles remotely.| Cyber Security News
Reddit has announced plans to significantly restrict the Internet Archive's Wayback Machine from indexing its platform, citing concerns that AI companies have been exploiting the archival service to circumvent Reddit's data protection policies.| Cyber Security News
Nation-state cyber threats have evolved dramatically over the past decade, with attackers employing increasingly sophisticated persistence techniques to maintain long-term access within targeted environments. These advanced persistent threats (APTs) are often orchestrated by government-backed groups with significant resources, making them particularly dangerous for critical infrastructure, government agencies, and large enterprises. This article explores the changing […]| Cyber Security News
A critical security vulnerability in ChatGPT has been discovered that allows attackers to embed malicious SVG (Scalable Vector Graphics) and image files directly into shared conversations, potentially exposing users to sophisticated phishing attacks and harmful content.| Cyber Security News
Obfuscation in malware refers to disguising code to make it difficult to understand or detect. It acts as digital camouflage, allowing malicious software to blend in with legitimate processes and files.| Cyber Security News
Apple has released critical security updates for macOS Sequoia, addressing multiple vulnerabilities that could allow malicious applications to access sensitive user data.| Cyber Security News
Authentication is verifying a user's or system's identity. Types - Single-Factor Authentication and Two-Factor Authentication.| Cyber Security News
Cryptocurrency scams have changed along with digital currencies and they now employ technological advancements like AI and deepfakes in their| Cyber Security News