Mandiant’s X Account Hacked to Promote Crypto Scam
Mandiant’s X account encountered a breach in security, which was tactically exploited by cybercriminals to enable the theft of cryptocurrency…
Chinese Hackers Exploit Zero-Day Flaws in Ivanti VPN
Chinese hackers have strategically exploited zero-day vulnerabilities within Ivanti’s Connect Secure (ICS) and Policy Secure, utilizing a sophisticated attack chain…
North Korean Hackers Stole $600M Cryptocurrency in 2023
In 2023, TRM Labs reveals the staggering $600 million cryptocurrency heist executed by hackers from North Korea Cryptocurrency theft has…
Attackers Exploit SMTP Smuggling: Bypassing Email Authentication through Spoofed Emails
An emerging exploitation method known as Simple Mail Transfer Protocol (SMTP) smuggling is being exploited by malicious actors to send…
Critical Update: Patching the Heap Buffer Overflow in Chrome’s WebRTC
Recent disclosures have brought attention to a highly significant vulnerability, known as CVE-2023-7024, which affects both Google Chrome and Microsoft…
Hackers Bypass Passwords Exploiting Google OAuth Endpoint to Access Accounts
Hackers have discovered and taken advantage of a vulnerability present in Google’s OAuth endpoint within the current cyber threat landscape….
Microsoft’s critical RCE: Securing Your Perforce Helix Core Server from Exploits
In August 2023, Microsoft’s security analysts unearthed critical vulnerabilities within the Perforce Helix Core Server, a widely utilized source code…
Categories
- Blog (9)
- Chrome (2)
- cisco (1)
- Cloud security (1)
- Crypto Scam (1)
- Cryptocurrency (2)
- Cryptojacking (1)
- CVE (20)
- Cyber News (9)
- cyber security (2)
- Data breaches (1)
- Email security (1)
- Email spoofing (1)
- Fashion (1)
- Guide (1)
- malware (1)
- Malware attack (1)
- Mandiant (1)
- News (15)
- OpenSSH (1)
- Password attack (1)
- Patch (6)
- Payment Security (1)
- phishing (1)
- ransomware (2)
- RCE (9)
- SMTP Smuggling (1)
- SQL injection attack (1)
- XSS attacks (2)
- zeroday (9)