The U.S-sanctioned Positive Technologies has underscored three vulnerabilities in the zoom, Zoom vulnerability that can be used for crashing or hijacking on-prem parts of…
cybersecurity news
FBI email system hacked, false cybersecurity alerts sent to thousands
The FBI reported threat actors taking over FBI email system to send thousands of false messages about a “sophisticated chain attack.” Threat intelligence non-profit…
MacOS Vulnerability Target Hong Kong
Google researchers have detected a zero-day MacOs vulnerability in operating system. The hackers have targeted Hong Kong websites of a media outlet and pro-democracy…
GlobalProtect VPN: Zero Day Disclosure
Palo Alto’s network GlobalProtect VPN has a new zero-day vulnerability reported by researchers. The vulnerability allows the hacker to use an unauthenticated network to…
Busybox Linux utility Vulnerabilities uncovered
Cybersecurity researchers discovered 14 critical vulnerabilities in the BusyBox Linux utility. The hackers can exploit the vulnerability for carrying out a denial-of-service (DoS) attack,…
Robinhood attack exposes millions of customers’ details
Robinhood, the popular investment & trading platform, was recently hacked and fell prey to an extortion attempt. The extorter used their unauthorized access to…
Cryptocurrency ATMs and QR codes used for fraud, reports the FBI
Cyberfraud victims are increasingly being asked to pay through Quick Response (QR) code and cryptocurrency ATMs. This makes recovery of payment impossible. The FBI…
QR codes used for stealing Microsoft credentials and crypto funds
Researchers discovered an email-based phishing scam: emails containing QR codes for pilfering users’ Microsoft details and other data. Between September 15 and October 13,…
Israeli researcher identifies more than 3,500 WiFi passwords
Israeli researcher identifies more than 3500 Wifi networks were hacked in Israel Tel Aviv without any difficulty. A total 0f 5000 wifi networks were…
SQUIRRELWAFFLE used for deploying Qakboat and Cobalt Strike
Many spam emails are acting as a channel for an unknown malware loader. The malware loader is undocumented, and it allows attackers to access…