Cisco's Discovers A Second Zero-Day Vulnerability

Cisco’s Discovery: A Second Zero-Day Vulnerability Despite the Decline in Hacked Devices

Cisco, a cybersecurity industry leader, recently brought a troubling revelation to light—an additional zero-day vulnerability actively exploited in IOS XE. This discovery occurs alongside a noteworthy reduction in compromised devices. In a proactive move, Cisco issued a warning to its valued…


0 Comments6 Minutes

EASY! Install Docker on Linux and Run Cybersecurity Tools like Kali

The ABCs of Docker Installation 🐳 Setting Up Kali Linux on Docker 🐉 🔥 Whether you’re a pen-tester, a cybersecurity enthusiast, or just curious about Docker, this video has something for everyone. So grab a ☕, get comfy, and let’s get this show on the road!


0 Comments1 Minute

Google Play Protect

Real-Time Code-Level Scanning is Now Available for Android Malware Thanks to Google Play Protect

An update to Google’s Play Protect has been released, and the company has revealed that it will now offer real-time scanning at the code level. This will allow Google to combat newly discovered harmful apps before users download and install them on Android devices. “Google Play Protect…


0 Comments4 Minutes

Lazarus group

Lazarus Group Is Going After Defense Experts Using Bogus Interviews Conducted Through Trojanized VNC Apps.

As part of a long-running campaign known as Operation Dream Job, the Lazarus Group which has ties to North Korea and is also known as Hidden Cobra or TEMP. Hermit has been seen employing trojanized versions of Virtual Network Computing (VNC) software as lures to target individuals working in the…


0 Comments6 Minutes

SpyNote

Be Cautious of SpyNote, an Android Trojan That Records Both Audio and Phone Calls

The Android banking trojan known as SpyNote has been deconstructed, revealing its multifaceted information-gathering capabilities. According to F-Secure, the attack chains that deploy this spyware mainly propagate through SMS phishing operations. These chains are intricately designed to mislead…


0 Comments4 Minutes

WinRAR Vulnerability

Pro-Russian Hackers Exploiting New WinRAR Vulnerability in Phishing Campaign

In a targeted phishing campaign designed to extract sensitive credentials from compromised computers, pro-Russian hacking groups have leveraged a recently identified security flaw in the WinRAR archiving software, granting them unauthorized access to systems. “The attack involves the use of…


0 Comments6 Minutes

Cisco Issues Urgent Patch to Address Critical Flaw in Emergency Responder Systems

Cisco Issues Urgent Patch to Address Critical Flaw in Emergency Responder Systems

Cisco has swiftly taken action to mitigate a significant security vulnerability impacting Emergency Responder systems. This flaw has the potential to be exploited by remote, unauthenticated attackers, allowing unauthorized access to vulnerable systems through hard-coded credentials. Cisco’s…


0 Comments3 Minutes

Supermicro Reveals Multiple Critical Vulnerabilities

BMC Firmware in Supermicro Reveals Multiple Critical Vulnerabilities

Recently, it was uncovered that Supermicro’s BMC firmware harbours numerous critical vulnerabilities. Security researchers have identified multiple flaws within the Intelligent Platform Management Interface (IPMI) firmware used in Supermicro baseboard management controllers (BMCs). These…


0 Comments6 Minutes

Microsoft Releases Patches

Microsoft Releases Patches for 103 Flaws in October 2023, Including 2 Active Exploits

Microsoft’s latest Patch Tuesday updates for October 2023 have been released, targeting a total of 103 vulnerabilities in its software. Notably, two of these vulnerabilities have already been actively exploited in the wild. [FREE E-BOOK] The Definite Blueprint for Cybersecurity in…


0 Comments4 Minutes

PEACHPIT

PEACHPIT: Ad Fraud Botnet on a Massive Scale – Millions of Hacked Android and iOS Devices

PEACHPIT, an ad fraud botnet, harnessed an army of hundreds of thousands of Android and iOS devices to generate illegal earnings for the scheme’s threat actors. This botnet is a component of a more extensive China-based operation called BADBOX, which includes the sale of off-brand mobile and…


0 Comments5 Minutes