Google Open Sources Magika: AI-Powered File Identification Tool

Google has announced that it's open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defend...
Read More

RustDoor macOS Backdoor Targets Cryptocurrency Firms with Fake Job Offers

Multiple companies operating in the cryptocurrency sector are the target of an ongoing malware campaign that involves a newly discovered App...
Read More

New Wi-Fi Authentication Bypass Flaw Puts Enterprise and Home Networks at Risk

Security researchers Mathy Vanhoef and Héloïse Gollier, have recently uncovered several critical vulnerabilities in the Wi-Fi authentication...
Read More

Zoom Desktop Flaws Let Attackers Launch Privilege Escalation Attacks

Zoom, a well-known video conferencing software, has patched seven vulnerabilities in its desktop and mobile applications, particularly a cri...
Read More

Wireshark 4.2.3 Released: What’s New!

Wireshark, the most popular network protocol analyzer worldwide, has released version 4.2.3, which includes new features and upgrades. Wires...
Read More

Critical Exchange Server Flaw (CVE-2024-21410) Under Active Exploitation

Microsoft on Wednesday acknowledged that a newly disclosed critical security flaw in Exchange Server has been actively exploited in the wild...
Read More

Hackers Exploit YouTube Videos to Deliver Password Stealing Malware

Threat actors hunt for ways to exploit vulnerabilities by employing tactics from technical zero-days to broad phishing.  Social engineering ...
Read More

Ubuntu 'command-not-found' Tool Could Trick Users into Installing Rogue Packages

Cybersecurity researchers have found that it's possible for threat actors to exploit a well-known utility called command-not-found to re...
Read More

Microsoft Rolls Out Patches for 73 Flaws, Including 2 Windows Zero-Days

Microsoft has released patches to address 73 security flaws spanning its software lineup as part of its Patch Tuesday updates for February 2...
Read More

10 Best Secure Network As a Service for MSP Providers – 2024

Secure Network as a Service (SNaaS) for Managed Service Providers (MSPs) delivers networking and security services to clients via the cloud,...
Read More

Coyote Malware Leverage NodeJS to Attack Users of 60+ Bank Users

In banking attacks, threat actors actively exploit the NodeJS to steal the online banking credentials of the targeted users. Threat actors u...
Read More

Alert: CISA Warns of Active 'Roundcube' Email Attacks - Patch Now

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Roundcube email s...
Read More

Rhysida Ransomware Cracked, Free Decryption Tool Released

Cybersecurity researchers have uncovered an "implementation vulnerability" that has made it possible to reconstruct encryption key...
Read More

Benefits of a vCISO for Small Businesses

Cybersecurity is of critical concern for every company, no matter their headcount or yearly revenue; in fact, many hackers target small and ...
Read More

U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders

The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions wit...
Read More

U.S. DoJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators

The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was used to sell a remote access trojan (RAT...
Read More

Alert: New Stealthy "RustDoor" Backdoor Targeting Apple macOS Devices

Apple macOS users are the target of a new Rust-based backdoor that has been operating under the radar since November 2023. The backdoor, co...
Read More

Fortinet Warns of Critical SSL VPN Flaw Exploited Actively in the Wild

Fortinet has issued a warning regarding a critical out-of-bounds write vulnerability in FortiOS.  Remote attackers can exploit this vulnerab...
Read More

Ransomware Payments Hitting Record High, Exceed $1 Billion

Chainalysis, a leading blockchain analysis firm, has recently released a report on ransomware payments revealing that they have skyrocketed ...
Read More

Top 10 Security Service Edge (SSE) Solutions for Network Security – 2024

Security Service Edge (SSE) is an idea in cybersecurity that shows how network security has changed over time. It combines different securit...
Read More

5 Data Encryption Challenges and How to Address Them

As the pace of revolutionary tech rollouts continues to build momentum, tech pundits are once again debating a possible paradigm shift regar...
Read More

Linux Shim Bootloader Flaw Expose Most Linux Distros to Code Execution Attacks

Shim is a small application used by open-source projects and other third parties for verifying and running the bootloader (typically GRUB2)....
Read More

Two New FortiSIEM Max-severity Flaw Let Attackers Execute Remote Code

FortiSIEM has been discovered with multiple OS command injection vulnerabilities, which could allow an unauthenticated remote threat actor t...
Read More

10 Best Secure Web Gateway Vendors in 2024

A Secure Web Gateway (SWG) is essential to any modern network infrastructure to protect users from online threats and enforce network-wide s...
Read More

Information Security Magazine

Latest Cyber Hacking News