Tag: CySecurity News – Latest Information Security and Hacking Incidents

50% of KEV Catalog Were Big Corporations

According to Grey Noise, almost 50% of the upgrades to the KEV catalog in 2022 were due to actively exploited vulnerabilities in Microsoft, Adobe, Cisco, and Apple products. The KEV catalog’s earlier vulnerabilities from before 2022 made up 77% of…

Twitter 400 Million User’s Details Up for Sale

Recently, the threat actor, “Ryushi”, allegedly reported having stolen data from Twitter, including details of some famous celebrities worldwide. He is demanding $200,000 (£166,000) to hand over the data back. According to the data, the hacker stole email addresses, and…

PyTorch Reveals Harmful “Dependency” Strain Compromise over Holidays

What is Torchitron? PyTorch has found a harmful dependency with the same name as the framework’s ‘torchtriton’ archive. This resulted in an executable compromise through the dependency confusion attack vector.  PyTorch administrators have warned users that installed PyTorch-nightly during the…

Potential Wiretapping Bugs Found in Google Home Speakers

  For identifying security issues with Google Home smart speakers, a security researcher recently received a bug bounty award of $107,500. It is possible to exploit these issues to install backdoors into the software and make it able to spy…

Multiple Malware Being Sold on Darkweb Forums

Researchers have recently discovered a new threat group, PureCoder, apparently selling numerous malware on the dark web. They listed malware such as miners, information stealers, and crypters, used by threat actors for their campaigns.  Spread of PureLogs/PureCrypt  Two of the…

A Zero-Trust Future Encourage Next-Generation Firewalls

The future of Zero Trust security relies greatly on next-generation firewalls (NGFWs). NGFWs are classified by Gartner Research as “deep packet inspection firewalls that incorporate software inspection, intrusion prevention, and the injection of intelligence from outside the firewall  in addition…

Here is Another Powerful Case Against Using Pirated Software

Downloading unlicensed software can save you a few dollars, but you risk losing much more because researchers have found a cryptocurrency-targeting info stealer hiding within the cracks. “RisePro” is a brand-new piece of information-stealing malware that was discovered by two…

Cybercriminals Use Google Ads to Deploy Malware

  Hackers are utilizing the Google Ads service more consistently than ever before to transmit malware. As soon as the victims click the download link on the threat actors’ fake versions of the official websites, trojanized software is distributed.  Grammarly,…

EarSpy Attack: Motion Data Sensors Used to Pry on Android Devices

A team of researchers has created an eavesdropping attack for Android devices that, to varying degrees, can identify the gender and identity of the caller and even decipher private speech.  EarSpy Attack  The side-channel attack, EarSpy, opens up new possibilities…

Cybersecurity in 2023: Will the Crypto Crash Impact It?

  One of the questions that naturally arise for those working within the cybersecurity industry after the fall of the FTX exchange puts an end to the cryptocurrency crash of 2022, includes asking how it will affect the cybercrime economy…

New Zealand Government Launches Open Banking for Consumers

  The New Zealand Government declared last month that open banking is coming to the island nation. This much-needed reform is the first step in making New Zealand’s financial ecosystem livelier and more competitive.  As the nation gets ready for…