Kategori: CyberSecurityNews

02
Ağu
2023

Hackers Released New Black Hat AI Tools XXXGPT and Wolf GPT

The rapid growth in generative AI tech is dramatically changing the complete threat scenario since threat actors actively exploit this…

02
Ağu
2023

Splunk SOAR Log Injection – Execute Malicious Code

Splunk has discovered a vulnerability that allows unauthenticated log injection, which could enable malicious actors to run harmful code on…

02
Ağu
2023

Canon Printers Wi-Fi connection settings Flaw

Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing…

02
Ağu
2023

What are the Hidden Dangers of .zip Domains

Google introduced eight new top-level domains at the beginning of May, such as .dad, .phd, .prof, .esq, .foo, .zip, .mov,…

02
Ağu
2023

QNAP Operating Systems Flaw Let Attackers Launch DoS Attacks

QNAP operating systems are robust, user-friendly software platforms that power NAS and NVR devices. QNAP offers four operating systems, and…

31
Tem
2023

AWS Will Begin Charging for the Use of Public IPv4 Addresses

IPv4 addresses have been on the verge of extinction ever since the last decade. The boom of IoT (Internet of…

31
Tem
2023

Spyware App Compromised Over 60,000 Android Devices

Spywares are software that is used as a surveillance application to collect sensitive information from victims and send it to…

31
Tem
2023

Trust Wallet Flaw Lets Attackers Steal Funds Without Interaction

Trust Wallet made a significant announcement on November 14th, 2022, unveiling its newly launched browser extension for wide usage. The…

31
Tem
2023

IBM Security Verify Access Let Attacker conduct phishing attacks

An Open-redirect vulnerability was discovered by IBM, which could allow threat actors to spoof the original URL of IBM Security…

29
Tem
2023

Weekly Roundup of Threat and Vulnerability from July 23rd to 29th

This week’s Threat and Vulnerability Roundup is here! We at Cyber Writes take pride in delivering a weekly roundup of…

28
Tem
2023

Hackers Stole 8 Million Data From U.S. Gov Services Contractor

Using a vulnerability in MOVEit Transfer, hackers gained access to 8 to 11 million individuals’ ‘Users Data’ protected health information….

28
Tem
2023

Metabase Critical Flaw Permit Attackers to Act as Servers

Recent reports indicate that Metabase has been discovered with an unauthenticated Remote Code Execution (RCE) vulnerability that lets threat actors…