QR Codes and Email Assaults: Black Basta Evolves
December 9, 2024
Introduction Since early October 2024, the cybercriminal group known as Black Basta has been using new types of malware, including Zbot and DarkGate. They have also changed how they trick people, using different social methods to fool their targets. You might be interested in: Cyber Security…
0 Comments5 Minutes
Mitel MiCollab Vulnerability Discovered
December 5, 2024
Introduction to the Vulnerability Security researchers have discovered a dangerous flaw in Mitel MiCollab that can allow attackers to access sensitive files from vulnerable systems. This issue stems from a critical vulnerability, identified as CVE-2024-41713, which affects the NuPoint Unified…
0 Comments4 Minutes
Europol Shuts Down MATRIX Service
December 4, 2024
Europol’s takedown of the encrypted messaging service MATRIX and the subsequent law enforcement operations have highlighted significant efforts by international authorities to disrupt illegal communication networks and cybercrime activities. Here's a breakdown of key developments from the…
0 Comments5 Minutes
Critical ICS Vulnerabilities This Week Demand Immediate Attention
December 3, 2024
Critical ICS Vulnerabilities This week's Cyble ICS vulnerability report uncovers severe security flaws in systems from Schneider Electric, mySCADA, and Automated Logic and Critical ICS Vulnerabilities. Vulnerabilities like CVE-2024-10575, CVE-2024-47407, and CVE-2024-8525 pose significant risks and…
0 Comments4 Minutes
Cyber Security Analyst: What They Do?
December 2, 2024
A Cyber Security Analyst plays a pivotal role in safeguarding an organization’s most critical digital assets—its computer systems and networks. This responsibility extends beyond merely reacting to cyber threats. Instead, it demands a proactive and strategic approach to identifying vulnerabilities,…
0 Comments10 Minutes
New Malware Campaign Targets GodLoader
November 28, 2024
Godot Engine Exploited in GodLoader Malware Attack A new malware campaign known as GodLoader is making waves, infecting more than 17,000 computers since June 2024. The attack takes advantage of the popular Godot Engine, an open-source game development platform. Cybercriminals are using the engine's…
0 Comments4 Minutes
Bootkitty: Linux’s First UEFI Bootkit
November 27, 2024
Cybersecurity experts have identified the first Unified Extensible Firmware Interface (UEFI) bootkit designed specifically for Linux-based computers. The bootkit, named Bootkitty by its creators, marks a new chapter in the evolution of cybersecurity threats. You might be interested in: Microsoft…
0 Comments4 Minutes
Critical Security Risks Found in WordPress Anti-Spam Plugin
November 26, 2024
Two Major Vulnerabilities Could Threaten Your Website A pair of serious vulnerabilities have been discovered in the Spam Prevention, Anti-Spam, and Firewall plugin for WordPress. These flaws could let attackers install and activate harmful plugins on unprotected websites, potentially leading to…
0 Comments3 Minutes
PyPI Library ‘aiocpa’ Breach Exposed via Telegram
November 25, 2024
What Happened? The Python library "aiocpa", an async and sync client for the Crypto Pay API, has been quarantined by the Python Package Index (PyPI) after a recent update was found to contain malicious code. This measure prevents further downloads and stops the package maintainers from making…
0 Comments3 Minutes
Microsoft and Meta Battle Cybercrime Networks
November 22, 2024
Microsoft and the Fight Against Phishing Scams Microsoft and Meta have stepped up their fight against cybercrime through its Digital Crimes Unit (DCU). Recently, the companies announced it had shut down 240 fake websites connected to a cybercriminal in Egypt known as Abanoub Nady, also referred to…
0 Comments5 Minutes