Tag: Cyber Security News

CISA Releases 7 ICS Advisories Detailing Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) issued seven Industrial Control Systems (ICS) advisories detailing critical vulnerabilities in widely used systems.  These advisories highlight critical vulnerabilities in ICS products from major vendors such ABB, Carrier, Siemens and Mitsubishi Electric, providing…

Windows Wi-Fi Password Stealer Malware Found Hosted on GitHub

A GitHub repository titled Windows-WiFi-Password-Stealer has surfaced, raising concerns among cybersecurity professionals.  This repository, hosted by the user “cyberthirty,” provides a Python-based script capable of extracting saved WiFi credentials from Windows systems and saving them to a text file.  While…

New NailaoLocker Ransomware Attacking European Healthcare

European healthcare organizations are facing a sophisticated cyber threat from a newly identified ransomware strain called NailaoLocker, deployed as part of a campaign tracked as Green Nailao by Orange Cyberdefense CERT. The attacks, first detected between June and October 2024,…

New Zhong Malware Exploit AnyDesk Tool To Attack Fintech & Cryptocurrency

A sophisticated malware campaign leveraging social engineering tactics has targeted financial technology and cryptocurrency platforms between December 20–24, 2024. Dubbed Zhong Stealer, this previously undocumented threat employed compromised AnyDesk installations and phishing lures to infiltrate systems, stealing credentials and establishing…

Multiple NVIDIA CUDA Toolkit Vulnerabilities Let Attackers Trigger DoS

Researchers uncovered nine critical vulnerabilities in NVIDIA’s CUDA Toolkit, a cornerstone software suite for GPU-accelerated computing. These vulnerabilities, spanning the cuobjdump and nvdisasm utilities, expose developers to denial-of-service (DoS) attacks and information disclosure risks when analyzing maliciously crafted cubin files.…

AWS Key Hunter – A Free Automated Tool to Detect Exposed AWS keys

AWS-Key-Hunter is an open-source tool released to automatically scan public GitHub repositories for exposed AWS access keys.  The tool, which leverages continuous monitoring and Discord-based alerts, aims to mitigate risks associated with accidental credential leaks in version control systems. According to the…

Microsoft Admin Technical Guide to Block & Remove Apps on Endpoints

In response to growing regulatory requirements worldwide, Microsoft has published detailed technical guidance for Intune administrators on blocking and removing specific applications from managed endpoints.  The guide focuses on compliance with international frameworks such as Australia’s Protective Security Policy Framework…