A new report from Microsoft’s Threat Intelligence team highlights that the Iranian hacking group, Mint Sandstorm, is conducting cyberattacks on US critical infrastructure as…
github
WiFi Protocol Flaw: Security Flaw Allows Hijacking of Network Traffic
A cybersecurity researchers have recently discovered a critical Wifi protocol flaw in the design of the IEEE 802.11 WiFi protocol standard. This vulnerability allows…
Twitter’s internal source code leak
Twitter has taken down internal source code and tools that were leaked on GitHub for several months. The leaked code exposed proprietary source code…
Hackers exploit a flaw in ZK Java Framework RCE -CISA warns
After threat actors started aggressively using the ZK Java Framework remote code execution (RCE) flaw in attacks, the U.S. Cybersecurity & Infrastructure Security Agency…
TELUS is investigating a leak of stolen source code, employee data
A threat actor has posted images that disclosed the TELUS company’s payroll details and source code repositories. TELUS is the 2nd most prominent company…
Vulnerability in Cisco ClamAV anti-malware scanner
A safety and security defect in a Cisco ClamAV anti-malware scanning device item has produced a significant safety and safety danger for some things…
The 0ktapus Phishing Attack: Campaign: The Most Prolific Phish
Global cybersecurity leader, Group-IB, has discovers that 9,931 thousand accounts from over 130 organisations were under compromise. It was because of a massive phishing…
Microsoft fixes three actively exploited Windows vulnerabilities.
Three zero-day vulnerabilities are included in Microsoft’s Patch Tuesday collection for February 2023. Not exactly the Valentine’s Day that we had in mind. If…
Microsoft OneNote files are used in new QakNote attacks to spread QBot malware.
Since the end of last week, a new QBot malware campaign known as “QakNote” has been spotted in the wild. This campaign infects computers…
Microsoft Defender now detecting Linux intrusions
Microsoft has made a significant move. To enhance the security of Linux-based devices with the addition of device isolation support to Microsoft Defender for…