Severe Security Flaw in Microsoft Teams Desktop App Let Attackers Access Authentication Tokens

Earlier, in August 2022, Vectra researchers discovered an attack path that let attackers with file system access to steal credentials for an...
Read More

Tips for Kubernetes Pod Security with Admission Controllers

The microservices that make up today’s modern infrastructure are almost always launched using containers, and these microservices are used t...
Read More

Lorenz Ransomware Group Breach Enterprise Networks Using Their Phone Systems

Using Mitel’s MiVoice VOIP appliances as a means to access the corporate network of enterprises, the Lorenz ransomware gang is now using a c...
Read More

Two-Year Long DangerousSavanna Campaign Attack Financial and Banking Institutions

Over the past two years, a persistent malicious campaign dubbed “DangerousSavanna” has targeted major financial institutions and insurance c...
Read More

Hackers Using Red Teaming Tools to Connect with C&C Servers After an Initial Compromise

Cyble Research and Intelligence Labs (CRIL) identified that attackers are using Red Teaming Tools for cyberattacks. During the routine threa...
Read More

North Korean APT Group Attacking Corporate Networks of Energy Providers

Lazarus (APT38), the North Korean APT group is attacking the corporate networks of energy providers by exploiting the VMWare Horizon servers...
Read More

GIFShell – New Attack Method That Allows Attackers to Steal Data Using Microsoft Teams GIFs

A cybersecurity consultant and pentester, Bobby Rauch recently discovered that threat actors are abusing Microsoft Teams by executing phishi...
Read More

Cisco Will Not Fix Authentication Bypass Flaw Affecting Multiple Small Business VPN Routers

The vulnerability tracked as (CVE-2022-20923) in the IPSec VPN Server authentication functionality of Cisco Small Business RV110W, RV130, RV...
Read More

Hackers Heavily Use Minecraft Game to Lure Players into Installing Malware

Cybercriminals use Minecraft to lure unsuspecting players into installing malware on their computers, as it is the most frequently abused ga...
Read More

Things you should know about sfp28

Do you want your business to run at top speed? If so, you need to be prepared for SFP28. SFP28 is the next generation of Ethernet speed, and...
Read More

EvilProxy – Phishing-As-A-Service Advertise Via Darkweb to Bypass 2FA

Recently, a PaaS (Phishing-as-a-Service) platform called EvilProxy that offers reverse-proxy services has emerged on the market and was iden...
Read More

Critical Atlassian Bitbucket Server and Data Center Flaw Let Attackers Execute Malicious Code

Atlassian revealed a critical security flaw in Bitbucket Server and Data Center that allows attackers to execute malicious code on vulnerabl...
Read More

Information Security Magazine

Latest Cyber Hacking News