Apple Fixes iOS and macOS Flaw That Could Bypass Security Prompts

Apple Updates iOS and macOS to Patch Flaw

Overview of the Issue Apple has released security patches for iOS 18, iPadOS 18, and macOS Sequoia 15 to fix a problem that could allow certain apps to gain access to sensitive data without users knowing. This problem, identified as CVE-2024-44131 and rated 5.3 on the CVSS scale, was found in the…


0 Comments4 Minutes

New Threat Exploits Windows UI Automation to Bypass Security

New Threat Exploits Windows UI Automation to Bypass Security

How Windows UI Automation Can Be Misused for Harmful Actions A recent security discovery highlights how attackers can take advantage of Windows' UI Automation (UIA) framework to carry out a variety of malicious actions without triggering alarms from endpoint detection and response (EDR) tools. This…


0 Comments5 Minutes

New Mobile Phishing Scheme Targets Android Users with Enhanced Antidot Trojan

New Mobile Phishing Scheme Targets Android Users with Enhanced Antidot Trojan

Sophisticated Mishing Campaign Unveiled Cybersecurity experts have discovered a new mobile phishing (mishing) attack aimed at distributing an advanced version of the Antidot banking malware. This marks the first time such a campaign has been identified by researchers in the field. You might be…


0 Comments5 Minutes

QR Codes and Email Assaults: Black Basta Evolves

QR Codes and Email Assaults: Black Basta Evolves

Introduction Since early October 2024, the cybercriminal group known as Black Basta has been using new types of malware, including Zbot and DarkGate. They have also changed how they trick people, using different social methods to fool their targets. You might be interested in: Cyber Security…


0 Comments5 Minutes

Mitel MiCollab Vulnerability Discovered

Introduction to the Vulnerability Security researchers have discovered a dangerous flaw in Mitel MiCollab that can allow attackers to access sensitive files from vulnerable systems. This issue stems from a critical vulnerability, identified as CVE-2024-41713, which affects the NuPoint Unified…


0 Comments4 Minutes

Europol Shuts Down MATRIX Service

Europol Shuts Down MATRIX Service

Europol’s takedown of the encrypted messaging service MATRIX and the subsequent law enforcement operations have highlighted significant efforts by international authorities to disrupt illegal communication networks and cybercrime activities. Here's a breakdown of key developments from the…


0 Comments5 Minutes

Critical ICS Vulnerabilities

Critical ICS Vulnerabilities This Week Demand Immediate Attention

Critical ICS Vulnerabilities This week's Cyble ICS vulnerability report uncovers severe security flaws in systems from Schneider Electric, mySCADA, and Automated Logic and Critical ICS Vulnerabilities. Vulnerabilities like CVE-2024-10575, CVE-2024-47407, and CVE-2024-8525 pose significant risks and…


0 Comments4 Minutes

Role of a Cyber Analyst

Cyber Security Analyst: What They Do?

A Cyber Security Analyst plays a pivotal role in safeguarding an organization’s most critical digital assets—its computer systems and networks. This responsibility extends beyond merely reacting to cyber threats. Instead, it demands a proactive and strategic approach to identifying vulnerabilities,…


0 Comments10 Minutes

New Malware Campaign Targets GodLoader

New Malware Campaign Targets GodLoader

Godot Engine Exploited in GodLoader Malware Attack A new malware campaign known as GodLoader is making waves, infecting more than 17,000 computers since June 2024. The attack takes advantage of the popular Godot Engine, an open-source game development platform. Cybercriminals are using the engine's…


0 Comments4 Minutes

Bootkitty: Linux’s First UEFI Bootkit

Cybersecurity experts have identified the first Unified Extensible Firmware Interface (UEFI) bootkit designed specifically for Linux-based computers. The bootkit, named Bootkitty by its creators, marks a new chapter in the evolution of cybersecurity threats. You might be interested in: Microsoft…


0 Comments4 Minutes