Tag: Cyber Security News
6 Best Practices To Protect Your Company From Data Loss
Data is a critical asset in today's digital business landscape. The loss of crucial information can result in severe financial damages and harm to...
FraudGPT: A New Dark Side AI Tool For Cyber Criminals
A new tool called FraudGPT has been launched by cybercriminals which pose a serious threat to both individuals and businesses.This black-hat-based tool is...
Critical MikroTik RouterOS Flaw Exposes 900,000 Systems to Cyber Attacks
MikroTik RouterOS were vulnerable to a privilege escalation vulnerability which was first disclosed in June 2022 at REcon. The vulnerability existed on the x86...
Zenbleed – AMD’s Zen2 Processor Flaw Allows Attackers to Steal Sensitive Data
The CPUs that are based on x86-64 architecture feature XMM registers (128-bit), recently extended to 256-bit (YMM) and 512-bit (ZMM) for greater capacity.Beyond number...
15 More Vulnerabilities Added to 2023 CWE Top 25 Most Dangerous Software
The CVE MITRE foundation has released the list of “On the Cusp” in which many of the CWEs (Common Weakness Enumerations) have increased as...
Critical Zyxel Firewall Injection Flaw Exploited to Conduct DDoS Attacks
Increased botnet activity targeting vulnerability(CVE-2023-28771) in Zyxel devices has become a major concern to its users.This vulnerability lets the unauthorized attacker execute the arbitrary...
Google is Blocking Employee Internet Access to Minimize Cyberattacks
Google is to start a pilot program to have employees work without internet access as a way to decrease the risk of cyberattacks.According to...
Hacked Microsoft Keys Let Attackers Access a Wide Range of Azure Applications
The China-linked threat actors who stole the US State Department and other Microsoft customer emails may have acquired access to apps other than Exchange...
Cisco Small Business IP Phones Flaw Allows XSS & Injection Attacks
Cisco has published a security advisory that states that they have discovered two vulnerabilities, an XSS and an HTML injection vulnerability.These vulnerabilities existed...
Hackers Deliver HotRat as Hidden Scripts in cracked software
The use of illegal software has been under circulation ever since there have been torrents and cracked software. Recent reports show that threat actors...