Critical ICS Vulnerabilities

Critical ICS Vulnerabilities This Week Demand Immediate Attention

Critical ICS Vulnerabilities This week's Cyble ICS vulnerability report uncovers severe security flaws in systems from Schneider Electric, mySCADA, and Automated Logic and Critical ICS Vulnerabilities. Vulnerabilities like CVE-2024-10575, CVE-2024-47407, and CVE-2024-8525 pose significant risks and…


0 Comments4 Minutes

Role of a Cyber Analyst

Cyber Security Analyst: What They Do?

A Cyber Security Analyst plays a pivotal role in safeguarding an organization’s most critical digital assets—its computer systems and networks. This responsibility extends beyond merely reacting to cyber threats. Instead, it demands a proactive and strategic approach to identifying vulnerabilities,…


0 Comments10 Minutes

New Malware Campaign Targets GodLoader

New Malware Campaign Targets GodLoader

Godot Engine Exploited in GodLoader Malware Attack A new malware campaign known as GodLoader is making waves, infecting more than 17,000 computers since June 2024. The attack takes advantage of the popular Godot Engine, an open-source game development platform. Cybercriminals are using the engine's…


0 Comments4 Minutes

Bootkitty: Linux’s First UEFI Bootkit

Cybersecurity experts have identified the first Unified Extensible Firmware Interface (UEFI) bootkit designed specifically for Linux-based computers. The bootkit, named Bootkitty by its creators, marks a new chapter in the evolution of cybersecurity threats. You might be interested in: Microsoft…


0 Comments4 Minutes

Critical Security Risks Found in WordPress Anti-Spam Plugin

Critical Security Risks Found in WordPress Anti-Spam Plugin

Two Major Vulnerabilities Could Threaten Your Website A pair of serious vulnerabilities have been discovered in the Spam Prevention, Anti-Spam, and Firewall plugin for WordPress. These flaws could let attackers install and activate harmful plugins on unprotected websites, potentially leading to…


0 Comments3 Minutes

PyPI Library'aiocpa' Breach Exposed via Telegram

PyPI Library ‘aiocpa’ Breach Exposed via Telegram

What Happened? The Python library "aiocpa", an async and sync client for the Crypto Pay API, has been quarantined by the Python Package Index (PyPI) after a recent update was found to contain malicious code. This measure prevents further downloads and stops the package maintainers from making…


0 Comments3 Minutes

Microsoft and Meta Battle Cybercrime Networks

Microsoft and Meta Battle Cybercrime Networks

Microsoft and the Fight Against Phishing Scams Microsoft and Meta have stepped up their fight against cybercrime through its Digital Crimes Unit (DCU). Recently, the companies announced it had shut down 240 fake websites connected to a cybercriminal in Egypt known as Abanoub Nady, also referred to…


0 Comments5 Minutes

145,000 Industrial control systems vulnerable across 175 countries

145,000 Industrial Control Systems Vulnerable Across 175 Countries

Over 145,000 ICS Devices Vulnerable Worldwide Recent research has revealed that more than 145,000 Industrial Control Systems (ICS) across 175 countries are accessible online, leaving them exposed to potential cyberattacks. Alarmingly, over one-third of these devices are located in the United…


0 Comments5 Minutes

Fake North Korean Companies Exploiting IT Workers for Funding

Fake North Korean Companies Exploiting IT Workers for Funding

How Fake North Korean Companies Are Used to Mask Their True Agenda A recent investigation has uncovered that individuals connected to Fake North Korea companies in the IT and tech consulting sectors are beign used to disguise their operations. These fake companies, often claiming to be based in the…


0 Comments4 Minutes

New Exploited Vulnerabilities in Palo Alto Networks

New Exploited Vulnerabilities in Palo Alto Networks

Two New Vulnerabilities Added to KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about two additional vulnerabilities in the Palo Alto Networks Expedition software that are currently being exploited in the wild. Details of the Security Flaws CISA…


0 Comments3 Minutes