A recent report by cybersecurity company Rezilion has revealed that over 15 million publicly facing services are susceptible to at least one of the 896 vulnerabilities listed in CISA’s KEV (known exploitable vulnerabilities) catalog. This large-scale research conducted by Rezilion…
Latest posts - Page 11
MoRTH suffers a data breach
Indian Ministry of Road Transport and Highways (MoRTH) was found to have a critical data leak by a student cybersecurity researcher, Robin Justin. This data leak potentially exposed the personally identifiable information (PII) of 185 million Indian citizens. Justin was…
Supply-chain attack on 3CX Could Impact Thousands of Companies
Hackers may have compromised the networks of thousands of businesses due to a supply-chain attack on the enterprise phone company 3CX, which confirmed on Thursday that its desktop app had been bundled with malware. This attack could have far-reaching implications…
IT Security Breach Reported at Shree Cement
Shree Cement, one of the leading cement manufacturing companies in India, reported an IT security breach on Tuesday. The company has confirmed that its IT security team took immediate action to address the incident. The security breach Incident In a…
SafeMoon Liquidity Pool Loses $8.9 Million Due to ‘Burn’ Bug Exploited by Hackers
SafeMoon, a cryptocurrency token, has become a victim of a security breach, which led to the loss of $8.9 million from its liquidity pool. Hackers exploited a newly created “burn” smart contract function that inflated the price of the token,…
Spyware Strikes Again: Google Uncovers Zero Day Shenanigans in Android and iOS!
Google’s Threat Analysis Group (TAG) uncovers new exploit chains that target zero-day and n-day vulnerabilities in Android, iOS, and Chrome. It install commercial spyware and malicious apps on targeted devices. The campaigns have highly targeted attacks, aimed at human rights…
WiFi Protocol Flaw: Security Flaw Allows Hijacking of Network Traffic
A cybersecurity researchers have recently discovered a critical Wifi protocol flaw in the design of the IEEE 802.11 WiFi protocol standard. This vulnerability allows attackers to manipulate data transmission, frame redirection, client spoofing, and capturing. The flaw specifically affects the…
Emotet Malware Targets US Taxpayers with Phishing Campaign
Emotet malware, a notorious infection distributed through phishing emails, is targeting US taxpayers through a new phishing campaign. The campaign is impersonating W-9 tax forms allegedly sent by the Internal Revenue Service (IRS) and companies the target works with. The…
Twitter’s internal source code leak
Twitter has taken down internal source code and tools that were leaked on GitHub for several months. The leaked code exposed proprietary source code and internal tools, which could pose a security risk to Twitter. The company has issued a…
A new ransomware operation, ‘Dark Power’, threatens global organizations
A new ransomware operation called “Dark Power” has emerged, targeting organizations worldwide and demanding relatively small ransom payments of $10,000. The group’s encryptor was compiled on January 29, 2023. It has already listed ten victims on a dark web data…