Kategori: CyberSecurityNews

03
Ağu
2023

Ivanti MobileIron API Access Flaw

There is a critical vulnerability in Ivanti’s MobileIron Core 11.2 version that could allow a malicious actor to gain unauthorized…

03
Ağu
2023

Hackers Exploit Salesforce Email Zero-day Flaw in Facebook

Hackers exploited a zero-day vulnerability in the email services and SMTP servers of Salesforce. Malicious email traffic is often concealed…

03
Ağu
2023

Chrome Security Update – 15 High-Severity Vulnerabilities Patched

Google has published a security update for Chrome, updating the Stable channel for Mac and Linux to 115.0.5790.170 and 115.0.5790.170/.171 for…

03
Ağu
2023

Midnight Blizzard Leverages Teams Chat to steal credentials

Microsoft Threat intelligence identifies Midnight Blizzard (previously tracked as NOBELIUM) as a highly targeted social engineering attack. The attacker uses…

02
Ağu
2023

Hackers Train AI-powered cybercrime Tools to Launch Cyber Attacks

There have been several reports recently about cybercriminals using AI-powered tools for malicious purposes which can give a paradise of…

02
Ağu
2023

Open-source Pentesting Tool Active Directory

SpecterOps announced BloodHound Community Edition (CE), which will be available in early access on August 8, 2023! SpecterOps is a…

02
Ağu
2023

Hackers Use Google AMP Pages to Bypass Email Security

A new phishing tactic was discovered that takes advantage of Google Accelerated Mobile Pages (AMP), which is known to be…

02
Ağu
2023

Cloudzy Accused for Providing Infrastructure to APT Hackers

The potentially unaware C2P entities that serve as legit businesses could be exploited easily by threat actors for attack campaigns…

02
Ağu
2023

Hackers Released New Black Hat AI Tools XXXGPT and Wolf GPT

The rapid growth in generative AI tech is dramatically changing the complete threat scenario since threat actors actively exploit this…

02
Ağu
2023

Splunk SOAR Log Injection – Execute Malicious Code

Splunk has discovered a vulnerability that allows unauthenticated log injection, which could enable malicious actors to run harmful code on…

02
Ağu
2023

Canon Printers Wi-Fi connection settings Flaw

Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing…

02
Ağu
2023

What are the Hidden Dangers of .zip Domains

Google introduced eight new top-level domains at the beginning of May, such as .dad, .phd, .prof, .esq, .foo, .zip, .mov,…