The vulnerability stems from how Outlook handles hyperlink objects in image tags in emails, enabling attackers to exploit a composite moniker to trigger remote code execution. This article has been indexed from Cyware News – Latest Cyber News Read the…
Category: Cyware News – Latest Cyber News
Critical Heap Overflow Vulnerability Discovered in FFmpeg, PoC Published
CVE-2024-7272 is a critical heap overflow vulnerability found in FFmpeg, the popular multimedia framework. The vulnerability affects versions up to 5.1.5 and has a CVSS score of 8.8. This article has been indexed from Cyware News – Latest Cyber News…
TLS Bootstrap Attack on Azure Kubernetes Services can Leak Sensitive Credentials
A new threat known as “WireServing” has been identified in Azure Kubernetes Services (AKS) by Mandiant. This vulnerability could have allowed attackers to escalate privileges and access sensitive credentials within compromised clusters. This article has been indexed from Cyware News…
New Msupedge Backdoor Targeting Taiwan Employs Stealthy Communications
Hackers have been using a PHP vulnerability to deploy a stealthy backdoor called Msupedge. This backdoor was recently used in a cyberattack against an unnamed university in Taiwan. This article has been indexed from Cyware News – Latest Cyber News…
RCE Vulnerability in Atlassian Bamboo Data Center and Server
This flaw, present in versions 9.1.0 through 9.6.0, allows authenticated attackers to execute arbitrary code within the Bamboo environment, posing risks to confidentiality, integrity, and availability. This article has been indexed from Cyware News – Latest Cyber News Read the…
Spring Security Flaw Leaves Applications Open to Unauthorized Access
A high-severity vulnerability (CVE-2024-38810) has been discovered in Spring Security, potentially allowing unauthorized access to sensitive data within affected applications. The vulnerability impacts Spring Security versions 6.3.0 and 6.3.1. This article has been indexed from Cyware News – Latest Cyber…
Rising Abuse of URL Rewriting in Phishing
The abuse of URL rewriting in phishing attacks has emerged as a new trend, allowing threat actors to hide malicious links behind trusted domains of security vendors. Exploiting these features enables bypassing detection mechanisms. This article has been indexed from…
Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove
Styx Stealer is based on the Phemedrone Stealer and is available for purchase online. It has the ability to steal passwords, cookies, crypto wallet data, and messenger sessions, as well as gather system information. This article has been indexed from…
Over 10,000 WordPress Sites at Risk: Critical File Deletion Flaw Found in InPost Plugins
The vulnerability, known as CVE-2024-6500, affects the InPost PL and InPost for WooCommerce plugins, allowing attackers to read and delete sensitive files like the wp-config.php configuration file. This article has been indexed from Cyware News – Latest Cyber News Read…
Africa’s Economies Feel Pain of Cybersecurity Deficit
Cybercrime is a growing threat to Africa’s economies, hindering their progress despite rapid GDP growth. The continent faces challenges like digital illiteracy and a shortage of cybersecurity professionals. This article has been indexed from Cyware News – Latest Cyber News…
To Improve Your Cybersecurity Posture, Focus on the Data
To bolster cybersecurity, focus on managing and utilizing enterprise data efficiently. Companies possess significant data reserves, yet these are often scattered across different systems, necessitating manual efforts to extract value. This article has been indexed from Cyware News – Latest…
Hackers Linked to $14M Holograph Crypto Heist Arrested in Italy
Suspected hackers who stole $14 million worth of cryptocurrency from Holograph, a blockchain tech firm, have been arrested in Italy after living a lavish lifestyle for weeks in luxury villas. This article has been indexed from Cyware News – Latest…
Russia-linked Vermin Hackers Target Ukraine With new Malware Strain
CERT-UA has identified the deployment of two malicious tools by Vermin: Spectr spyware, which can capture screenshots and steal data, and a new malware strain called Firmachagent, which is used to upload stolen data. This article has been indexed from…
UK: NCSC Opens Cyber Resilience Audit Scheme to Applicants
The NCSC has launched the Cyber Resilience Audit (CRA) scheme to find auditors for a new cyber-resilience initiative. It focuses on conducting independent audits based on the Cyber Assessment Framework (CAF) to support nationally critical sectors. This article has been…
OpenAI Kills Iranian Accounts Spreading Us Election Disinformation
The operation was linked to Iran’s Storm-2035, also flagged by Microsoft for election interference. Google has also reported Iranian cyber influence activity. OpenAI identified 12 X accounts and one Instagram account involved in the operation. This article has been indexed…
Common API Security Issues: From Exposed Secrets To Unauthorized Access
API security is a major concern due to issues like exposed secrets and unauthorized access, leading to serious vulnerabilities for many organizations. A recent report shoed 35% of exposed API keys are still active, posing significant security risks. This article…
Digital Wallets can Allow Purchases With Stolen Credit Cards
Once a stolen card is added to the attacker’s wallet, they can use it to make purchases without being detected, even after the original card has been canceled. Recurring transactions are also vulnerable to abuse, allowing payments with locked cards.…
x64dbg: Open-Source Binary Debugger for Windows
x64dbg is an open-source binary debugger for Windows, perfect for malware analysis and reverse engineering executables. It has a user-friendly UI that simplifies navigation and provides context on the process. This article has been indexed from Cyware News – Latest…
Chrome Will Redact Credit Cards, Passwords When You Share Android Screen
Google is testing a feature in Chrome on Android to redact credit card details, passwords, and sensitive information when sharing your screen. Google aims to prevent leaks of sensitive data while recording or sharing screens. This article has been indexed…
Xeon Sender Enables Large-Scale SMS Spam Attacks Using Legitimate SaaS Providers
Xeon Senderallows attackers to conduct large-scale SMS spam and phishing campaigns using legitimate SaaS providers. Distributed through Telegram and hacking forums, it requires API credentials from popular providers like Amazon SNS and Twilio. This article has been indexed from Cyware…