PEACHPIT: Ad Fraud Botnet on a Massive Scale – Millions of Hacked Android and iOS Devices
October 10, 2023
PEACHPIT, an ad fraud botnet, harnessed an army of hundreds of thousands of Android and iOS devices to generate illegal earnings for the scheme’s threat actors. This botnet is a component of a more extensive China-based operation called BADBOX, which includes the sale of off-brand mobile and…
0 Comments5 Minutes
Apple Releases Security Updates for Actively Exploited iOS Bug
October 5, 2023
On Wednesday, Apple swiftly released crucial security updates to address a newly discovered zero-day vulnerability in iOS and iPadOS. The company confirmed that this vulnerability was already under active exploitation in real-world scenarios. This kernel vulnerability, designated as CVE-2023-42824,…
0 Comments4 Minutes
Update Your Android Device Immediately! Google Addresses Two Actively Exploited Vulnerabilities.
October 5, 2023
In its latest round of security upgrades for October, Google has taken action to address a total of 53 vulnerabilities, with two of them currently under active exploitation by cyber threats. Google’s security alert suggests that these two vulnerabilities are being targeted in a focused and…
0 Comments6 Minutes
Microsoft Issues a Cyber Attack Warning Regarding Attempts to Hack Cloud Using SQL Server Instance
October 4, 2023
Attackers attempted lateral movement into a cloud environment via a SQL Server instance in a recent campaign, as outlined by Microsoft. In a report published on Tuesday, security experts Sunders Bruskin, Hagai Ran Kestenberg, and Fady Nasereldeen highlighted that “the attackers initially…
0 Comments4 Minutes
FBI Issues Warning About Rising Trend of Dual Ransomware Attacks on U.S. Businesses
October 3, 2023
Since at least July 2023, the FBI in the United States has been issuing warnings about a concerning new trend: simultaneous ransomware attacks targeting the same victims. According to an FBI advisory, these dual ransomware attacks involved two distinct versions selected from the following variants:…
0 Comments3 Minutes
Microsoft SharePoint Server authentication bypass exploit revealed.
October 2, 2023
GitHub provides proof-of-concept code for a serious authentication bypass vulnerability in Microsoft SharePoint Server that allows privilege escalation. Unauthenticated attackers can get administrator rights after exploiting CVE-2023-29357 in low-complexity attacks without user interaction. [FREE…
0 Comments3 Minutes
Google Releases Patch for Actively Exploited Zero-Day Vulnerability
September 29, 2023
Google rolled out fixes on Wednesday to address an actively exploited zero-day vulnerability in the Chrome browser. Tracked as CVE-2023-5217, this high-severity vulnerability is a heap-based buffer overflow in the VP8 compression format within libvpx, a free software video codec library developed…
0 Comments6 Minutes
Exploring the Stages of Penetration Testing
Tutorials & Webinars,Security Audits & Penetration Testing
September 26, 2023
In the ever-evolving world of cybersecurity, no system can claim to be 100% secure. This is where penetration testing, often referred to as pentesting, comes into play. It serves as a comprehensive process that scans, evaluates, and fortifies all the essential components of an information system…
0 Comments8 Minutes
Understanding How MDR Combats Cyberthreats
September 21, 2023
Threat actors are always active, leveraging vulnerabilities, phishing, remote access, and social engineering to inflict significant damage on an organization’s systems. Defending against the relentless and sophisticated barrage of cybersecurity threats is a challenge. Phishing attacks,…
0 Comments5 Minutes
6 Easy Rules to Follow to Stay Safe Online
September 19, 2023
Teaching people how to stay safe online and avoid falling victim to cybercrimes primarily revolves around human behaviour. For those deeply entrenched in the world of IT or passionate PC enthusiasts, computers may seem as logical as Mr. Spock himself. However, for individuals less familiar with…
0 Comments10 Minutes