Uncategorized
Phishing Threats and Cybersecurity 2024 : Protecting Personal and Organizational Data
As Americans engage in major activities such as the 2024 presidential race, large-scale cultural festivals, and high-profile sporting events, cybersecurity will be on high alert. Phishing attacks involve users through
CrowdStrike Outage Leads to Estimated Financial Loss of $5.4 Billion
A recent global IT outage linked to CrowdStrike, a leading cybersecurity company, has resulted in an estimated $5.4 billion in direct financial losses for Fortune 500 companies, according to a
Hackers Abuse Microsoft Office Forms to Launch Two-Step Phishing Attacks
Cybercriminals are increasingly using Microsoft Office Forms to launch sophisticated two-step phishing attacks. At present, certain individuals are being tricked into divulging their Microsoft 365 (M365) login information through Office Forms.
Beware Of Malicious Chrome Installer From Chinese Hackers
A malicious Chrome installer, ChromeSetup.msi, distributed via drive-by download, delivers a novel Gh0st RAT variant, dubbed Gh0stGambit, that evasively retrieves and executes encrypted payloads. The RAT is a modified open-source
Threat Actors Exploiting Selenium Grid Services For Cryptomining
Threat actors often exploit the cloud services for cryptomining, as doing so allows them to abuse the huge computational resources available. This enables them to significantly maximize their mining efficiency
ServiceNow Flaw Let Remote Attackers Execute Arbitrary Code
ServiceNow recently disclosed three critical vulnerabilities (CVE-2024-4879, CVE-2024-5217, and CVE-2024-5178) affecting multiple Now Platform versions, allowing unauthenticated remote code execution and unauthorized file access. The vulnerabilities, with CVSS scores ranging
ConfusedFunction Vulnerability in Google Cloud Platform Let Attackers Escalate Privileges
A newly discovered vulnerability in Google Cloud Platform (GCP) has raised significant security concerns among users and experts alike. The vulnerability, dubbed “ConfusedFunction,” involves GCP’s Cloud Functions and Cloud Build
PKfail Vulnerability Allows Hackers to Install UEFI Malware on Over 200 Device Models
The PKfail vulnerability is a significant security issue affecting over 200 device models of Secure Boot. PKfail is a critical firmware supply-chain issue that undermines the Secure Boot process in
North Korean Charged in Cyberattacks on US Hospitals, NASA & Military Bases
A North Korean military intelligence operative has been indicted for orchestrating a series of cyberattacks targeting U.S. hospitals, NASA, and military bases, federal prosecutors announced on Thursday. Rim Jong Hyok,