Browsing category

Data Security

Azure DDoS Protection service was unable to protect Microsoft, how it will protect clients?

In recent weeks, a hacker collective calling itself Anonymous Sudan has been responsible for launching distributed denial of service attacks (DDoS) on a number of Microsoft services, including Outlook, OneDrive, and Microsoft Azure, amongst others. These attack events, which typically lasted between one and two hours, were successful in their goal of crippling Microsoft’s services […]

Hack networks using Citrix ShareFile StorageZones Controller using the flaw with CVSS score of 9.1

In the constantly shifting field of cybersecurity, new problems are always cropping up, which requires prompt attention and comprehensive answers. A severe flaw in the Citrix customer-managed ShareFile storage zones controller has just come to light as a result of a recent discovery, and as a result, immediate correction is required. This potentially dangerous vulnerability […]

Big german university shuts down every computer on campus after ransomware attack

Following events that have affected at least a half dozen other comparable institutions in recent months, the Kaiserslautern University of Applied Sciences (HS Kaiserslautern) has become the latest German-speaking university to be targeted by a ransomware attack. HS Kaiserslautern is one of the major applied science universities in the state of Rhineland-Palatinate, which is located […]

New AiTM Phishing Attack Technique Makes It Easy to Hack Business Email Accounts

Experts from Microsoft Defender discovered a multi-stage adversary-in-the-middle (AiTM) phishing and business email compromise (BEC) attack that targeted firms that provide banking and financial services. The attack began with the penetration of a reliable third-party vendor and progressed into a string of AiTM attacks as well as subsequent BEC activities that spread across many businesses. […]

New undetectable technique allows hacking big companies using ChatGPT

According to the findings of recent study conducted, harmful packages may be readily propagated into development environments with the assistance of ChatGPT, which can be used by attackers. In a blog post published, researchers from Vulcan Cyber outlined a novel method for propagating malicious packages that they dubbed “AI package hallucination.” The method was conceived […]

Send spoofed phishing emails to Gmail accounts

The most people use Gmail, which has a total user base of a staggering 1.5 billion people. This represents 18.75% of the total population of the planet. The security mechanisms of Gmail are well-known for their effectiveness in preventing hackers from gaining control of user accounts. Gmail has included a new function that displays an […]

Isolate or shut down your MOVEit Transfer servers and machines immediately

The significance of keeping one’s data safe has never been more pressing than it is in today’s increasingly linked society. Zero-day vulnerabilities are known to often hide in the shadows of our digital landscapes, where they patiently wait to be exploited. Today, we are going to shed light on one of these recently discovered vulnerabilities […]

If your Laptop or PC has Gigabyte motherboard then it has backdoor for hackers

Researchers at the cybersecurity firm Eclypsium, which focuses on firmware, reported today that they have found a secret backdoor  in the firmware of motherboards manufactured by the Taiwanese manufacturer Gigabyte. Gigabyte’s components are often used in gaming PCs and other high-performance systems. Eclypsium discovered that whenever a computer with the affected Gigabyte motherboard restarts, code inside […]

New phishing technique to allows hacking someone using .zip & .mov domains

When a victim visits a website ending in .ZIP, a recently developed phishing method known as “file archiver in the browser” may be used to “emulate” file-archiving software in the target’s web browser. According to information published by a security researcher named mr.d0x last week, “with this phishing attack, you simulate a file archiver software […]

OpenSSL flaw allows slowing down websites and applications with client authentication

For your online application or server to be secure, SSL/TLS certificates are necessary. While many trustworthy certificate authorities charge a fee for SSL/TLS certificates, it is also feasible to create your own certificate using OpenSSL. Self-signed certificates may nonetheless encrypt your online traffic even if they don’t have the approval of a reputable organization. The […]

Portuguese banks customers beware these hackers want to steal your money

According to a report published by SentinelLabs on Thursday, a Brazilian hacking crew targeted users of more than 30 Portuguese financial institutions earlier this year in a campaign that provides the latest example of powerful, financially motivated hackers in Brazil targeting targets outside of the country’s borders. The campaign was part of a campaign that […]

PyPI gives up against hackers, stops new user signups and new packages uploads

Python Package Index (PyPI), the official third-party software repository for the Python programming language, has temporarily restricted the ability for users to sign up and submit new packages until further notice. This change was made by the administrators of PyPI. PyPI, the official third-party repository for open-source Python packages, has implemented new security measures in […]