
Blog Series
Cybersecurity News
- No categories

Threat actors targets Bitwarden via...
Threat actors are targeting Bitwarden through Google ads phishing campaigns in order to steal users’ password vault credentials. A spoof version of Bitwarden was expertly created to look exactly like...
Killnet threat group uses DDoS...
DDoS attacks on German airports, banks, and government agencies have been blamed on Killnet, a self-proclaimed Russian hacktivist group. DDoS is a distributed denial-of-service (DDoS) attack that uses a flood...
Treliix fixes 62,000 open-source projects...
According to the Trellix research team, they patched nearly 62,000 open-source projects that were vulnerable to a 15-year-old path traversal vulnerability in the Python programming ecosystem. The organization stated that...
Researchers uncovers PlugX malware infection...
Palo Alto Networks Unit 42 security researchers investigated a PlugX malware variant that can hide malicious files on removable USB devices and then infect the Windows hosts to which they...
Researchers release exploit for Microsoft...
Akamai researchers have published a proof-of-concept (PoC) for a vulnerability in a Microsoft tool that enables the Windows application development interface to deal with cryptography. The vulnerability, CVE-2022-34689, was discovered...
EmojiDeploy bug allows RCE in...
Ermetic researchers discovered EmojiDeploy, a cross-site request forgery (CSRF) bug in Microsoft Azure services that could allow attackers to remotely execute code on affected systems. According to the company’s blog...
Patched Fortinet flaw still being...
Chinese hackers were discovered using a recently discovered flaw in Fortinet’s FortiOS software as a zero-day vulnerability to distribute malware. CVE-2022-42475 (CVSS score of 9.8) is a buffer overflow vulnerability...
Kaspersky reports Wroba.o to Google...
Kaspersky has discovered a new malicious app known as Wroba.o that uses DNS hijacking to steal victims’ personal and financial information. The app, discovered in the Google Play Store, masquerades...
New Hook malware for Android...
ThreatFabric cybersecurity researchers have discovered a new type of Android malware known as ‘Hook.’ Hackers can use the malware to gain remote control of an infected device and steal sensitive...
How GPT models can be...
According to CyberArk researchers, GPT-based models like ChatGPT can be used to create polymorphic malware because they can generate large amounts of unique and varied text. The researchers claim that...
Attackers actively exploit Unpatched Control...
Malicious hackers have started exploiting a critical vulnerability CVE-2022-44877 in unpatched versions of the Control Web Panel, a popular free, closed-source web-hosting interface. The vulnerability allows remote code execution without...