Kategori: CyberSecurityNews

28
Tem
2023

Hackers Exploit Windows Search Feature to Execute Malware

Malware authors persistently seek novel approaches to exploit unsuspecting users in the active cyber threat landscape. To easily locate all…

28
Tem
2023

Hackers distribute PurpleFox Malware Using MS-SQL Servers

The purple fox malware has been active since 2018, adopting a new technique to deliver its payload through MS SQL…

26
Tem
2023

API Security – Top 4 Challenges Faced by CISOs

CISOs recognize the importance of integrating web applications and API security to protect sensitive customer data while facilitating seamless business…

26
Tem
2023

How it Assists Attackers & Security Analysts

OpenAI’s ChatGPT, released in November 2022, stunned users with its diverse capabilities, answering questions and crafting custom essays, sparking widespread…

26
Tem
2023

Over 19 Million Password Logs Sold on the Dark Web and Telegram

The rapid increase of info stealers has emerged as a major risk for organizations, including chatGPT, and has led to…

26
Tem
2023

Cryptojacking Attack Patterns Checklist for Administrators

Cloud cryptojacking disguises itself as cloud computing resource abuse, where threat actors exploit legitimate tenants for cryptocurrency mining using their…

26
Tem
2023

Top 7 Ecommerce Security Threats in 2023

The ecommerce industry is on the rise. According to Statista, global e-commerce sales amounted to approximately $5.2 trillion. Moreover, experts…

26
Tem
2023

Thales Acquired Cyber Security Company Imperva

Thales has acquired a prominent cybersecurity company situated in the United States, renowned for its proficiency in data and application…

26
Tem
2023

Hackers Mimic Popular VPN Download page to Deliver Malware

As per reports, threat actors have been using domestic VPN installation files for distributing SparkRAT malware which leads to MeshAgent…

25
Tem
2023

Apple, iPhone’lara Saldırmak İçin İstismar Edilen Sıfırıncı Gün Güvenlik Açıklarını Düzeltiyor

Apple, iPhone, Mac ve iPad’lere yönelik saldırılarda yararlanılan ve Apple cihazlarının dijital güvenliğini ciddi şekilde etkileyen sıfırıncı gün güvenlik açıklarını…

25
Tem
2023

Atlassian RCE Kusuru, Saldırganın Keyfi Kod Yürütmesine İzin Verdi

18 Temmuz’da Atlassian, hata ödül programları, üçüncü taraf kitaplık taramaları ve sızma testi yoluyla kritik ve yüksek güvenlik açıkları keşfetti….

25
Tem
2023

Şifreli Polis ve Askeri Telsizlerde Çoklu Kusurlar

Küresel radyolar, TETRA (Karasal Ana Hat Radyosu) standart, ancak Avrupa, Birleşik Krallık ve diğer ülkelerde kullanımını etkileyen çeşitli güvenlik açıkları…