Tag: Cyber Threats
-
Hackers try to exploit WordPress plugin vulnerability that’s as severe as it gets
Hackers are assailing websites using a prominent WordPress plugin with millions of attempts to exploit a high-severity vulnerability that …
-
Hackers make millions of attempts to exploit WordPress plugin vulnerability
Hackers are assailing websites using a prominent WordPress plugin with millions of attempts to exploit a high-severity vulnerability that …
-
Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike
Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting …
-
Hacker posts fake news story about Ukrainians trying to kill Slovak President
Czech news agency ČTK announced on Tuesday that a hacker had managed to break into its systems and published fake news reports of a plot …
-
Pakistani APT Hackers Attacking Indian Govt Entities With Weaponized Shortcut Files
Cybersecurity experts at Seqrite Labs have reported a surge in cyberattacks against Indian government entities. These attacks have been …
-
Authorities Warned that Hackers Are Exploiting Flaws in CISCO ASA VPNs
In a joint advisory released by cybersecurity agencies across Canada, Australia, and the United Kingdom, IT professionals and managers in …
-
Hackers Exploit Cisco Firewall Zero-Days to Hack Government Networks
Security researchers at Cisco Talos have uncovered a sophisticated cyber espionage campaign dubbed “ArcaneDoor” conducted by a …
-
Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the …
-
UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know
In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services …
-
Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape
AI’s newfound accessibility will cause a surge in prompt hacking attempts and private GPT models used for nefarious purposes, a new …
-
CoralRaider Hacker Evade Antivirus Detections Using Malicious LNK File
This campaign is observed to be targeting multiple countries, including the U.S., Nigeria, Germany, Egypt, the U.K., Poland, the …
●●●