Skip to content

First Hackers News

Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.

FHN
Primary Menu
  • Home
  • About Us
  • Proactive Security
  • Security Training
  • CVE’s
  • Careers
    • Employee & Employer
  • Contact
Live
Exclusive
ChatGPT Image Mar 6, 2026, 01_21_02 PM Apache ActiveMQ Vulnerability Enables DoS Attacks ChatGPT Image Mar 6, 2026, 12_54_45 PM WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered ChatGPT Image Mar 5, 2026, 04_38_59 AM ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs ChatGPT Image Mar 5, 2026, 12_02_40 AM Fake LastPass Support Scam Targets Password Vaults ChatGPT Image Mar 4, 2026, 06_20_56 AM OAuth Phishing Campaign Targets Entra ID and Google Workspace
  • Latest
  • Popular
  • Update
  • Apache ActiveMQ Vulnerability Enables DoS Attacks ChatGPT Image Mar 6, 2026, 01_21_02 PM

    Apache ActiveMQ Vulnerability Enables DoS Attacks

    March 7, 2026
  • WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered ChatGPT Image Mar 6, 2026, 12_54_45 PM

    WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered

    March 7, 2026
  • ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs ChatGPT Image Mar 5, 2026, 04_38_59 AM

    ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs

    March 5, 2026
  • Fake LastPass Support Scam Targets Password Vaults ChatGPT Image Mar 5, 2026, 12_02_40 AM

    Fake LastPass Support Scam Targets Password Vaults

    March 5, 2026
  • Android November Security Update Tracker Android Security Update

    Android November Security Update Tracker

    November 9, 2020
  • Johnson & Johnson Targeted By Hackers — COVID-19 vaccine johnson-johnson

    Johnson & Johnson Targeted By Hackers — COVID-19 vaccine

    December 5, 2020
  • MacOS Users Targeted With Updated Malware Backdoor Attack

    MacOS Users Targeted With Updated Malware

    December 1, 2020
  • Alert! Microsoft Warns of New Android Ransomware android

    Alert! Microsoft Warns of New Android Ransomware

    October 13, 2020
  • Apache ActiveMQ Vulnerability Enables DoS Attacks ChatGPT Image Mar 6, 2026, 01_21_02 PM

    Apache ActiveMQ Vulnerability Enables DoS Attacks

    March 7, 2026
  • WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered ChatGPT Image Mar 6, 2026, 12_54_45 PM

    WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered

    March 7, 2026
  • ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs ChatGPT Image Mar 5, 2026, 04_38_59 AM

    ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs

    March 5, 2026
  • Fake LastPass Support Scam Targets Password Vaults ChatGPT Image Mar 5, 2026, 12_02_40 AM

    Fake LastPass Support Scam Targets Password Vaults

    March 5, 2026

Main News

ChatGPT Image Mar 6, 2026, 01_21_02 PM
  • Cybersecurity
  • Malware
  • Secuirty Update
  • Security Advisory
  • vulnerability

Apache ActiveMQ Vulnerability Enables DoS Attacks

FHN March 7, 2026
ChatGPT Image Mar 6, 2026, 12_54_45 PM
  • Application Security
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • wordpress

WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered

FHN March 7, 2026
ChatGPT Image Mar 5, 2026, 04_38_59 AM
  • Cybercriminals
  • Cybersecurity
  • malicious cyber actors
  • Malware

ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs

FHN March 5, 2026
ChatGPT Image Mar 5, 2026, 12_02_40 AM
  • Cybersecurity
  • Cyber threat
  • cyberattack
  • Cybercriminals
  • Email Security
  • malicious cyber actors
  • phishing
  • Secuirty Update

Fake LastPass Support Scam Targets Password Vaults

FHN March 5, 2026
ChatGPT Image Mar 4, 2026, 06_20_56 AM
  • Tips
  • Application Security
  • Cybersecurity
  • Email Security
  • Internet Security
  • malicious cyber actors
  • phishing
  • Secuirty Update

OAuth Phishing Campaign Targets Entra ID and Google Workspace

FHN March 4, 2026

Trending Now

Apache ActiveMQ Vulnerability Enables DoS Attacks ChatGPT Image Mar 6, 2026, 01_21_02 PM 1

Apache ActiveMQ Vulnerability Enables DoS Attacks

March 7, 2026
WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered ChatGPT Image Mar 6, 2026, 12_54_45 PM 2

WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered

March 7, 2026
ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs ChatGPT Image Mar 5, 2026, 04_38_59 AM 3

ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs

March 5, 2026
Fake LastPass Support Scam Targets Password Vaults ChatGPT Image Mar 5, 2026, 12_02_40 AM 4

Fake LastPass Support Scam Targets Password Vaults

March 5, 2026
OAuth Phishing Campaign Targets Entra ID and Google Workspace ChatGPT Image Mar 4, 2026, 06_20_56 AM 5

OAuth Phishing Campaign Targets Entra ID and Google Workspace

March 4, 2026

Featured Posts

ChatGPT Image Mar 6, 2026, 01_21_02 PM
  • Cybersecurity
  • Malware
  • Secuirty Update
  • Security Advisory
  • vulnerability

Apache ActiveMQ Vulnerability Enables DoS Attacks

FHN March 7, 2026
ChatGPT Image Mar 6, 2026, 12_54_45 PM
  • Application Security
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • wordpress

WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered

FHN March 7, 2026
ChatGPT Image Mar 5, 2026, 04_38_59 AM
  • Cybercriminals
  • Cybersecurity
  • malicious cyber actors
  • Malware

ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs

FHN March 5, 2026
ChatGPT Image Mar 5, 2026, 12_02_40 AM
  • Cybersecurity
  • Cyber threat
  • cyberattack
  • Cybercriminals
  • Email Security
  • malicious cyber actors
  • phishing
  • Secuirty Update

Fake LastPass Support Scam Targets Password Vaults

FHN March 5, 2026

VULNERABILITY

Apache ActiveMQ Vulnerability Enables DoS Attacks ChatGPT Image Mar 6, 2026, 01_21_02 PM
  • Cybersecurity
  • Malware
  • Secuirty Update
  • Security Advisory
  • vulnerability

Apache ActiveMQ Vulnerability Enables DoS Attacks

March 7, 2026
MS-Agent Flaw Allows Remote Hijacking of AI Agents ChatGPT Image Mar 3, 2026, 03_02_38 AM
  • vulnerability
  • AI Malware
  • Application Security
  • Microsoft
  • Secuirty Update

MS-Agent Flaw Allows Remote Hijacking of AI Agents

March 3, 2026
Critical OneUptime Vulnerability Allows Remote System Takeover ChatGPT Image Mar 2, 2026, 11_25_35 AM
  • vulnerability
  • Cybersecurity
  • Security Advisory

Critical OneUptime Vulnerability Allows Remote System Takeover

March 2, 2026
Google Fixes Critical Chrome Flaws in PDFium and V8 ChatGPT Image Feb 20, 2026, 03_46_23 AM
  • google
  • Application Security
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • vulnerability

Google Fixes Critical Chrome Flaws in PDFium and V8

February 20, 2026

DATA BREACH

PayPal Data Exposure: Six Months of User Information Leaked Online ChatGPT Image Feb 20, 2026, 11_49_42 PM
  • Application Security
  • Cybersecurity
  • Data Breach
  • Internet Security
  • malicious cyber actors
  • Secuirty Update
  • Security Advisory

PayPal Data Exposure: Six Months of User Information Leaked Online

February 21, 2026
Cisco Unified Communications Zero-Day RCE Enables Root Access ChatGPT Image Jan 22, 2026, 01_25_59 AM
  • cisco
  • cisco
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory
  • vulnerability
  • Zero Day Attack

Cisco Unified Communications Zero-Day RCE Enables Root Access

January 22, 2026
𝗖𝗶𝘀𝗰𝗼 𝗔𝘀𝘆𝗻𝗰𝗢𝗦 𝟬-𝗗𝗮𝘆 𝗨𝗻𝗱𝗲𝗿 𝗔𝗰𝘁𝗶𝘃𝗲 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗮𝘁𝗶𝗼𝗻 Screenshot 2025-12-18 002706
  • Cyber threat
  • cisco
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • vulnerability

𝗖𝗶𝘀𝗰𝗼 𝗔𝘀𝘆𝗻𝗰𝗢𝗦 𝟬-𝗗𝗮𝘆 𝗨𝗻𝗱𝗲𝗿 𝗔𝗰𝘁𝗶𝘃𝗲 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗮𝘁𝗶𝗼𝗻

December 18, 2025
Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group download-6
  • Cybersecurity
  • Data Breach
  • Ransomware
  • Security Advisory
  • Threat Intelligence
  • vulnerability
  • Zero Day Attack

Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group

October 7, 2025

AI NEWS

OpenClaw Exploit Compromises Developer AI Agents ChatGPT Image Mar 2, 2026, 12_17_30 AM
  • AI Expansion
  • AI Malware
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

OpenClaw Exploit Compromises Developer AI Agents

March 2, 2026
Hacker Manipulates Claude AI to Steal Government Data ChatGPT Image Feb 26, 2026, 04_32_07 AM
  • Application Security
  • AI Expansion
  • AI Malware
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • OpenAI
  • Secuirty Update
  • Security Advisory

Hacker Manipulates Claude AI to Steal Government Data

February 26, 2026
AI Tools Help Hacker Breach 600+ FortiGate Devices ChatGPT Image Feb 24, 2026, 12_18_14 PM
  • AI Expansion
  • AI Malware
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

AI Tools Help Hacker Breach 600+ FortiGate Devices

February 24, 2026
Google Blocks 1.75 Million Harmful Apps from Play Store in 2025 ChatGPT Image Feb 21, 2026, 12_10_31 AM
  • Application Security
  • AI Expansion
  • AI Malware
  • Cybersecurity
  • google
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Google Blocks 1.75 Million Harmful Apps from Play Store in 2025

February 21, 2026
ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs ChatGPT Image Mar 5, 2026, 04_38_59 AM
  • Cybercriminals
  • Cybersecurity
  • malicious cyber actors
  • Malware

ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs

FHN March 5, 2026
Security researchers have uncovered a coordinated malware campaign targeting people working in the cryptocurrency and Web3 industry....
Read More Read more about ClickFix Malware Targets Crypto Experts via Fake LinkedIn VCs
Fake LastPass Support Scam Targets Password Vaults ChatGPT Image Mar 5, 2026, 12_02_40 AM
  • Cybersecurity
  • Cyber threat
  • cyberattack
  • Cybercriminals
  • Email Security
  • malicious cyber actors
  • phishing
  • Secuirty Update

Fake LastPass Support Scam Targets Password Vaults

FHN March 5, 2026
A new phishing campaign is pretending to be LastPass support emails to trick users into revealing their...
Read More Read more about Fake LastPass Support Scam Targets Password Vaults
OAuth Phishing Campaign Targets Entra ID and Google Workspace ChatGPT Image Mar 4, 2026, 06_20_56 AM
  • Tips
  • Application Security
  • Cybersecurity
  • Email Security
  • Internet Security
  • malicious cyber actors
  • phishing
  • Secuirty Update

OAuth Phishing Campaign Targets Entra ID and Google Workspace

FHN March 4, 2026
Microsoft has discovered advanced phishing campaigns that misuse the normal behavior of the OAuth 2.0 authentication process....
Read More Read more about OAuth Phishing Campaign Targets Entra ID and Google Workspace
Chrome Introduces Quantum-Safe HTTPS Protection ChatGPT Image Mar 3, 2026, 03_56_46 AM
  • google
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Chrome Introduces Quantum-Safe HTTPS Protection

FHN March 3, 2026
Google Chrome’s security team has announced a new plan to protect HTTPS from future quantum computer attacks....
Read More Read more about Chrome Introduces Quantum-Safe HTTPS Protection
MS-Agent Flaw Allows Remote Hijacking of AI Agents ChatGPT Image Mar 3, 2026, 03_02_38 AM
  • vulnerability
  • AI Malware
  • Application Security
  • Microsoft
  • Secuirty Update

MS-Agent Flaw Allows Remote Hijacking of AI Agents

FHN March 3, 2026
A serious security issue has been found in the MS-Agent framework. The flaw, tracked as CVE-2026-2256, allows...
Read More Read more about MS-Agent Flaw Allows Remote Hijacking of AI Agents
GTFire Phishing Attack Hides Behind Google Services ChatGPT Image Mar 2, 2026, 03_42_10 PM
  • Threat Intelligence
  • Application Security
  • Cyber threat
  • cyberattack
  • Cybersecurity
  • Email Security
  • Internet Security
  • malicious cyber actors
  • phishing
  • Secuirty Update

GTFire Phishing Attack Hides Behind Google Services

FHN March 3, 2026
GTFire is a newly identified phishing campaign that misuses trusted Google services, including Firebase and Google Translate,...
Read More Read more about GTFire Phishing Attack Hides Behind Google Services
Claude AI Outage Causes Widespread Service Errors ChatGPT Image Mar 2, 2026, 03_15_41 PM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

Claude AI Outage Causes Widespread Service Errors

FHN March 3, 2026
On March 2, 2026, Anthropic’s AI assistant Claude experienced a major global outage that disrupted users and...
Read More Read more about Claude AI Outage Causes Widespread Service Errors
Critical OneUptime Vulnerability Allows Remote System Takeover ChatGPT Image Mar 2, 2026, 11_25_35 AM
  • vulnerability
  • Cybersecurity
  • Security Advisory

Critical OneUptime Vulnerability Allows Remote System Takeover

FHN March 2, 2026
A critical security flaw (CVE-2026-27728) has been identified in OneUptime, a service monitoring platform. The issue allows...
Read More Read more about Critical OneUptime Vulnerability Allows Remote System Takeover
Massive Scanning Campaign Targets SonicWall Firewalls ChatGPT Image Mar 2, 2026, 03_46_34 AM
  • Application Security
  • Compromised
  • Cyber threat
  • cyberattack
  • Cybercriminals
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Secuirty Update
  • Security Advisory

Massive Scanning Campaign Targets SonicWall Firewalls

FHN March 2, 2026
Hackers are actively mapping SonicWall firewalls worldwide. In just four days, over 84,000 SonicOS scanning sessions were...
Read More Read more about Massive Scanning Campaign Targets SonicWall Firewalls
OpenClaw Exploit Compromises Developer AI Agents ChatGPT Image Mar 2, 2026, 12_17_30 AM
  • AI Expansion
  • AI Malware
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

OpenClaw Exploit Compromises Developer AI Agents

FHN March 2, 2026
OpenClaw, a popular open-source AI assistant with over 100,000 GitHub stars, recently fixed a serious security flaw...
Read More Read more about OpenClaw Exploit Compromises Developer AI Agents
i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict ChatGPT Image Mar 1, 2026, 12_34_06 PM
  • Application Security
  • Cyber threat
  • cyberattack
  • Cybercriminals
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Secuirty Update
  • Security Advisory

i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict

FHN March 2, 2026
The ongoing Middle East conflict has significantly elevated cyber risk across the region. During periods of geopolitical...
Read More Read more about i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict
Fake Zoom Update Infects 1,437 in Days ChatGPT Image Feb 26, 2026, 11_39_19 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Fake Zoom Update Infects 1,437 in Days

FHN February 26, 2026
A new scam is targeting Zoom users by exploiting trust in meeting invitations. In just twelve days,...
Read More Read more about Fake Zoom Update Infects 1,437 in Days
Hacker Manipulates Claude AI to Steal Government Data ChatGPT Image Feb 26, 2026, 04_32_07 AM
  • Application Security
  • AI Expansion
  • AI Malware
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • OpenAI
  • Secuirty Update
  • Security Advisory

Hacker Manipulates Claude AI to Steal Government Data

FHN February 26, 2026
A hacker reportedly manipulated Anthropic’s Claude AI to assist in a coordinated cyberattack against Mexican government agencies,...
Read More Read more about Hacker Manipulates Claude AI to Steal Government Data
Microsoft Detects Malicious Next.js Repos Used in Live Attack Campaigns ChatGPT Image Feb 25, 2026, 12_34_28 AM
  • Microsoft
  • Application Security
  • Cybersecurity
  • malicious cyber actors
  • Secuirty Update
  • Security Advisory

Microsoft Detects Malicious Next.js Repos Used in Live Attack Campaigns

FHN February 25, 2026
Microsoft says attackers are creating fake Next.js projects to trick developers. These projects look normal and often...
Read More Read more about Microsoft Detects Malicious Next.js Repos Used in Live Attack Campaigns
AI Tools Help Hacker Breach 600+ FortiGate Devices ChatGPT Image Feb 24, 2026, 12_18_14 PM
  • AI Expansion
  • AI Malware
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

AI Tools Help Hacker Breach 600+ FortiGate Devices

FHN February 24, 2026
A financially motivated threat actor used commercial generative AI tools to compromise more than 600 FortiGate devices...
Read More Read more about AI Tools Help Hacker Breach 600+ FortiGate Devices
ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools ChatGPT Image Feb 24, 2026, 04_54_59 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • spyware

ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools

FHN February 24, 2026
ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional...
Read More Read more about ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools
Google Blocks 1.75 Million Harmful Apps from Play Store in 2025 ChatGPT Image Feb 21, 2026, 12_10_31 AM
  • Application Security
  • AI Expansion
  • AI Malware
  • Cybersecurity
  • google
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Google Blocks 1.75 Million Harmful Apps from Play Store in 2025

FHN February 21, 2026
Google says it stopped more than 1.75 million malicious or policy-violating Android apps from reaching users in...
Read More Read more about Google Blocks 1.75 Million Harmful Apps from Play Store in 2025
PayPal Data Exposure: Six Months of User Information Leaked Online ChatGPT Image Feb 20, 2026, 11_49_42 PM
  • Application Security
  • Cybersecurity
  • Data Breach
  • Internet Security
  • malicious cyber actors
  • Secuirty Update
  • Security Advisory

PayPal Data Exposure: Six Months of User Information Leaked Online

FHN February 21, 2026
Software Error in Business Loan Application PayPal has notified a small group of customers about a cybersecurity...
Read More Read more about PayPal Data Exposure: Six Months of User Information Leaked Online
Google Fixes Critical Chrome Flaws in PDFium and V8 ChatGPT Image Feb 20, 2026, 03_46_23 AM
  • google
  • Application Security
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • vulnerability

Google Fixes Critical Chrome Flaws in PDFium and V8

FHN February 20, 2026
Three Vulnerabilities Could Allow Remote Code Execution Google has released an urgent Chrome security update fixing three...
Read More Read more about Google Fixes Critical Chrome Flaws in PDFium and V8
PromptSpy: Android Malware Uses Google Gemini AI ChatGPT Image Feb 19, 2026, 11_51_54 PM
  • Malware
  • AI Malware
  • Android malware
  • Application Security
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • OpenAI
  • Secuirty Update
  • Security Advisory

PromptSpy: Android Malware Uses Google Gemini AI

FHN February 20, 2026
PromptSpy is a newly discovered Android malware family that uses Google’s Gemini AI model to make real-time...
Read More Read more about PromptSpy: Android Malware Uses Google Gemini AI
Microsoft 365 Copilot AI Summary Flaw Exposes Emails ChatGPT Image Feb 19, 2026, 03_24_44 AM
  • Application Security
  • Cybersecurity
  • Microsoft
  • Secuirty Update
  • Security Advisory
  • vulnerability
  • Vulnerability Reports

Microsoft 365 Copilot AI Summary Flaw Exposes Emails

FHN February 19, 2026
A security weakness in Microsoft 365 Copilot is allowing the AI assistant to generate summaries of emails...
Read More Read more about Microsoft 365 Copilot AI Summary Flaw Exposes Emails
Threat Actors Push ClickFix Payload via Browser Cache ChatGPT Image Feb 19, 2026, 12_15_02 AM
  • Application Security
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • Tips

Threat Actors Push ClickFix Payload via Browser Cache

FHN February 19, 2026
Cybersecurity researchers have uncovered a new version of the ‘ClickFix’ social engineering campaign. In this updated attack,...
Read More Read more about Threat Actors Push ClickFix Payload via Browser Cache
Critical zero-day vulnerability is being actively exploited in Dell RecoverPoint ChatGPT Image Feb 17, 2026, 11_30_10 PM
  • vulnerability
  • Application Security
  • Cybersecurity
  • Exploitation
  • Secuirty Update
  • Security Advisory

Critical zero-day vulnerability is being actively exploited in Dell RecoverPoint

FHN February 18, 2026
The flaw, tracked as CVE-2026-22769, has a maximum CVSS score of 10.0 (Critical) and has been exploited...
Read More Read more about Critical zero-day vulnerability is being actively exploited in Dell RecoverPoint
Cloud Password Managers Expose 25 Security Flaws ChatGPT Image Feb 16, 2026, 11_05_58 PM
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • vulnerability

Cloud Password Managers Expose 25 Security Flaws

FHN February 17, 2026
Researchers from ETH Zurich have discovered 25 serious security vulnerabilities in three major cloud password managers: Bitwarden,...
Read More Read more about Cloud Password Managers Expose 25 Security Flaws
Critical Chrome Zero-Day Under Active Exploitation ChatGPT Image Feb 16, 2026, 12_39_36 AM
  • google
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

Critical Chrome Zero-Day Under Active Exploitation

FHN February 16, 2026
Google has released an urgent Chrome update to fix a high-severity vulnerability that is actively being exploited....
Read More Read more about Critical Chrome Zero-Day Under Active Exploitation
BeyondTrust Flaw Opens the Door to Complete Active Directory Compromise ChatGPT Image Feb 16, 2026, 12_11_36 AM
  • vulnerability
  • Application Security
  • Cybersecurity
  • Secuirty Update
  • Security Advisory

BeyondTrust Flaw Opens the Door to Complete Active Directory Compromise

FHN February 16, 2026
A newly disclosed high-risk vulnerability, tracked as CVE-2026-1731, is impacting self-managed deployments of BeyondTrust Remote Support (RS)...
Read More Read more about BeyondTrust Flaw Opens the Door to Complete Active Directory Compromise
Critical Notepad++ Flaw Allows Code Execution, CISA Issues Alert ChatGPT Image Feb 13, 2026, 03_21_06 AM
  • Application Security
  • Cybersecurity
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Critical Notepad++ Flaw Allows Code Execution, CISA Issues Alert

FHN February 13, 2026
CISA has raised concerns about a serious security issue affecting Notepad++, one of the most widely used...
Read More Read more about Critical Notepad++ Flaw Allows Code Execution, CISA Issues Alert
Over 37 Million Users Targeted by 287 Malicious Chrome Extensions ChatGPT Image Feb 12, 2026, 12_18_32 PM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory
  • Tips

Over 37 Million Users Targeted by 287 Malicious Chrome Extensions

FHN February 13, 2026
A recent investigation uncovered 287 Chrome extensions that may be quietly collecting users’ browsing data and transmitting...
Read More Read more about Over 37 Million Users Targeted by 287 Malicious Chrome Extensions
Threat Actors Leverage ChatGPT, Grok, and Google Ads to Deploy macOS AMOS Stealer ChatGPT Image Feb 12, 2026, 04_36_29 AM
  • AI Malware
  • Application Security
  • Cybersecurity
  • Internet Security
  • MacOS
  • Malware
  • Secuirty Update
  • Security Advisory

Threat Actors Leverage ChatGPT, Grok, and Google Ads to Deploy macOS AMOS Stealer

FHN February 12, 2026
Threat actors are evolving — and they’re doing it on trusted platforms. A recent campaign shows attackers...
Read More Read more about Threat Actors Leverage ChatGPT, Grok, and Google Ads to Deploy macOS AMOS Stealer
Microsoft 365 Admin Center Disruption Affects North American Users ChatGPT Image Feb 10, 2026, 12_56_19 PM
  • Microsoft
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

Microsoft 365 Admin Center Disruption Affects North American Users

FHN February 11, 2026
Microsoft 365 administrators across North America are experiencing significant access issues with the Microsoft 365 admin center,...
Read More Read more about Microsoft 365 Admin Center Disruption Affects North American Users
Malicious 7-Zip Files Converting PCs into Proxy Nodes ChatGPT Image Feb 10, 2026, 12_13_02 PM
  • Application Security
  • Compromised
  • Cybersecurity
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Secuirty Update
  • Security Advisory

Malicious 7-Zip Files Converting PCs into Proxy Nodes

FHN February 10, 2026
Cybercriminals are running a sneaky operation that uses a fake version of the popular 7-Zip archiving tool...
Read More Read more about Malicious 7-Zip Files Converting PCs into Proxy Nodes
FortiOS Authentication Flaw Enables LDAP Bypass ChatGPT Image Feb 10, 2026, 11_57_46 AM
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • vulnerability

FortiOS Authentication Flaw Enables LDAP Bypass

FHN February 10, 2026
A new security advisory from Fortinet highlights a serious weakness in FortiOS that could let attackers slip...
Read More Read more about FortiOS Authentication Flaw Enables LDAP Bypass
Claude Desktop Security Bug Opens Door to RCE ChatGPT Image Feb 10, 2026, 03_11_58 AM
  • Cybersecurity
  • Application Security
  • Secuirty Update
  • Security Advisory

Claude Desktop Security Bug Opens Door to RCE

FHN February 10, 2026
Security researchers at LayerX uncovered a design-level weakness affecting Claude Desktop Extensions (DXT), the extension framework tied...
Read More Read more about Claude Desktop Security Bug Opens Door to RCE
Using Windows Minifilters to Identify Ransomware Activity ChatGPT Image Feb 9, 2026, 04_32_05 AM
  • Cybersecurity
  • Application Security
  • Internet Security
  • Ransomware
  • Secuirty Update
  • Security Advisory
  • windows

Using Windows Minifilters to Identify Ransomware Activity

FHN February 9, 2026
A security researcher has published a proof-of-concept tool on GitHub aimed at stopping ransomware from inside the...
Read More Read more about Using Windows Minifilters to Identify Ransomware Activity
5 Million+ Misconfigured Git Servers Leave Secrets Open to the Internet ChatGPT Image Feb 9, 2026, 03_29_55 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

5 Million+ Misconfigured Git Servers Leave Secrets Open to the Internet

FHN February 9, 2026
A widespread web server misconfiguration issue has quietly exposed millions of websites to potential data theft and...
Read More Read more about 5 Million+ Misconfigured Git Servers Leave Secrets Open to the Internet
Apple Pay Users Hit by Phishing Scam Designed to Harvest Payment Data ChatGPT Image Feb 8, 2026, 04_58_02 AM
  • Apple
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • Web application security

Apple Pay Users Hit by Phishing Scam Designed to Harvest Payment Data

FHN February 8, 2026
A new and well-planned phishing campaign is targeting users of Apple’s payment ecosystem. The attackers are not...
Read More Read more about Apple Pay Users Hit by Phishing Scam Designed to Harvest Payment Data
The Next Generation of Malware: AI-Enabled and Adaptive Threats  ChatGPT Image Feb 4, 2026, 11_47_21 PM
  • AI Expansion
  • AI Malware
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

The Next Generation of Malware: AI-Enabled and Adaptive Threats 

FHN February 6, 2026
Recent research from Google’s Threat Intelligence Group reveals that adversaries are now building malware that actively leverages artificial intelligence (AI) during...
Read More Read more about The Next Generation of Malware: AI-Enabled and Adaptive Threats 
Critical Flaws in F5 BIG-IP and NGINX Prompt Urgent Security Patches ChatGPT Image Feb 6, 2026, 03_01_00 AM
  • vulnerability
  • Cybersecurity
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Vulnerability Reports

Critical Flaws in F5 BIG-IP and NGINX Prompt Urgent Security Patches

FHN February 6, 2026
F5 has released its latest security update, fixing several vulnerabilities across its products. Although F5 lists some...
Read More Read more about Critical Flaws in F5 BIG-IP and NGINX Prompt Urgent Security Patches
Security Gaps in TP-Link Devices Expose Users to Full Control Attacks ChatGPT Image Feb 5, 2026, 12_41_28 AM
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • vulnerability
  • Vulnerability Reports

Security Gaps in TP-Link Devices Expose Users to Full Control Attacks

FHN February 5, 2026
TP-Link has disclosed multiple serious security flaws in its Archer BE230 v1.2 Wi-Fi router. These vulnerabilities allow...
Read More Read more about Security Gaps in TP-Link Devices Expose Users to Full Control Attacks
Mass Scanning Campaign Targets Exposed Citrix NetScaler Login Pages ChatGPT Image Feb 4, 2026, 03_43_29 AM
  • Citrix
  • citrix servers
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • Security Update
  • vulnerability

Mass Scanning Campaign Targets Exposed Citrix NetScaler Login Pages

FHN February 4, 2026
A large, organized scanning campaign has been observed targeting Citrix NetScaler (ADC) Gateway systems across the internet....
Read More Read more about Mass Scanning Campaign Targets Exposed Citrix NetScaler Login Pages
Hackers Leverage LOLBins to Deliver Advanced PeckBirdy Malware ChatGPT Image Feb 3, 2026, 12_28_49 PM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

Hackers Leverage LOLBins to Deliver Advanced PeckBirdy Malware

FHN February 4, 2026
A malware framework called PeckBirdy has been active since 2023, using built-in system tools (LOLBins) to quietly...
Read More Read more about Hackers Leverage LOLBins to Deliver Advanced PeckBirdy Malware
Windows 11 Strengthens Protection of System Files ChatGPT Image Feb 2, 2026, 11_59_25 AM
  • windows
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

Windows 11 Strengthens Protection of System Files

FHN February 3, 2026
Microsoft has issued KB5074105, an important preview update for Windows 11 versions 24H2 and 25H2, aimed at...
Read More Read more about Windows 11 Strengthens Protection of System Files
ShadowHS Linux Malware Spreading Quietly ChatGPT Image Feb 2, 2026, 11_26_48 AM
  • Malware
  • Application Security
  • Cybersecurity
  • Internet Security
  • Linux Malware
  • malicious cyber actors
  • Secuirty Update
  • Security Advisory

ShadowHS Linux Malware Spreading Quietly

FHN February 2, 2026
A newly observed Linux threat called ShadowHS is showing how modern attackers are moving beyond traditional malware....
Read More Read more about ShadowHS Linux Malware Spreading Quietly
Security Lapse Exposes 21,000+ OpenClaw AI Deployments ChatGPT Image Feb 2, 2026, 10_47_36 AM
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

Security Lapse Exposes 21,000+ OpenClaw AI Deployments

FHN February 2, 2026
A fast-growing open-source personal AI project has unintentionally created a major security concern after more than 21,000...
Read More Read more about Security Lapse Exposes 21,000+ OpenClaw AI Deployments
Metasploit Update Adds New Exploits for Enterprise Platforms ChatGPT Image Feb 2, 2026, 05_16_45 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory
  • Tips

Metasploit Update Adds New Exploits for Enterprise Platforms

FHN February 2, 2026
The latest Metasploit Framework update brings several new modules that help security teams test real-world attack paths....
Read More Read more about Metasploit Update Adds New Exploits for Enterprise Platforms
Johnson Controls Products Exposed to Remote SQL Injection Flaws Feb 2, 2026, 12_06_01 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

Johnson Controls Products Exposed to Remote SQL Injection Flaws

FHN February 2, 2026
A serious security warning has been issued for several Johnson Controls industrial control products due to a...
Read More Read more about Johnson Controls Products Exposed to Remote SQL Injection Flaws
Semantic Chaining Attack Bypasses AI Safety Controls cyber-security-3400657_1920
  • Internet Security
  • Cybersecurity
  • Secuirty Update

Semantic Chaining Attack Bypasses AI Safety Controls

FHN January 30, 2026
Researchers at NeuralTrust uncovered a new AI weakness called Semantic Chaining. It affects multimodal systems like Grok...
Read More Read more about Semantic Chaining Attack Bypasses AI Safety Controls
Growing eSkimming Attacks Create Ongoing Security Challenges ChatGPT Image Jan 29, 2026, 12_50_11 AM
  • Cybersecurity
  • Secuirty Update
  • Security Advisory

Growing eSkimming Attacks Create Ongoing Security Challenges

FHN January 29, 2026
A year-long study tracking 550 hacked e-commerce sites across 68 countries shows that removing a skimmer once...
Read More Read more about Growing eSkimming Attacks Create Ongoing Security Challenges
New MITRE Framework Aims to Protect Embedded Devices ChatGPT Image Jan 28, 2026, 02_23_40 PM
  • Cybersecurity
  • Secuirty Update
  • Security Advisory

New MITRE Framework Aims to Protect Embedded Devices

FHN January 29, 2026
MITRE has just unveiled a dedicated cybersecurity framework — the Embedded Systems Threat Matrix™ (ESTM) — to...
Read More Read more about New MITRE Framework Aims to Protect Embedded Devices
PoC Released for GNU Telnetd RCE, 800K+ Still Exposed ChatGPT Image Jan 26, 2026, 11_37_52 PM
  • Cybersecurity
  • Application Security
  • Secuirty Update
  • Security Advisory
  • Vulnerability Reports

PoC Released for GNU Telnetd RCE, 800K+ Still Exposed

FHN January 27, 2026
A working proof-of-concept exploit has been made public for CVE-2026-24061, a critical remote code execution vulnerability affecting...
Read More Read more about PoC Released for GNU Telnetd RCE, 800K+ Still Exposed
Microsoft Teams Is Adding Wi-Fi Location Tracking — and It’s Raising Big Questions ChatGPT Image Jan 26, 2026, 01_48_59 AM
  • Microsoft
  • Application Security
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory

Microsoft Teams Is Adding Wi-Fi Location Tracking — and It’s Raising Big Questions

FHN January 26, 2026
Microsoft is preparing to introduce a new Teams feature that can automatically show where employees are working...
Read More Read more about Microsoft Teams Is Adding Wi-Fi Location Tracking — and It’s Raising Big Questions
Windows 11 January Update Triggers Serious Boot Issues ChatGPT Image Jan 26, 2026, 01_26_15 AM
  • windows
  • Application Security
  • Internet Security
  • Microsoft
  • Secuirty Update
  • Security Advisory

Windows 11 January Update Triggers Serious Boot Issues

FHN January 26, 2026
Microsoft investigates startup and stability issues affecting recent Windows 11 versions Microsoft is investigating serious problems linked...
Read More Read more about Windows 11 January Update Triggers Serious Boot Issues
New Osiris Ransomware Campaign Exploits Living-off-the-Land Tools Arctic-Wolf-Fog-Ransomware
  • Cybersecurity
  • Application Security
  • Ransomware
  • Secuirty Update
  • Security Advisory

New Osiris Ransomware Campaign Exploits Living-off-the-Land Tools

FHN January 23, 2026
A recently identified ransomware strain named Osiris was linked to an intrusion at a large food services...
Read More Read more about New Osiris Ransomware Campaign Exploits Living-off-the-Land Tools
OWASP ZAP Releases New Penetration Testing Browser Extension ChatGPT Image Jan 23, 2026, 02_07_05 AM
  • Cybersecurity
  • Cyber threat
  • cyberattack
  • malicious cyber actors
  • Secuirty Update
  • Security Advisory

OWASP ZAP Releases New Penetration Testing Browser Extension

FHN January 23, 2026
The OWASP ZAP project has introduced a new add-on that brings the OWASP Penetration Testing Kit (PTK)...
Read More Read more about OWASP ZAP Releases New Penetration Testing Browser Extension
BIND 9 Vulnerability Can Crash DNS Servers ChatGPT Image Jan 22, 2026, 04_53_20 AM
  • Internet Security
  • Secuirty Update
  • Security Advisory
  • vulnerability

BIND 9 Vulnerability Can Crash DNS Servers

FHN January 22, 2026
A newly reported high-impact security flaw in BIND 9, one of the most widely deployed DNS server...
Read More Read more about BIND 9 Vulnerability Can Crash DNS Servers
Cisco Unified Communications Zero-Day RCE Enables Root Access ChatGPT Image Jan 22, 2026, 01_25_59 AM
  • cisco
  • cisco
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory
  • vulnerability
  • Zero Day Attack

Cisco Unified Communications Zero-Day RCE Enables Root Access

FHN January 22, 2026
Cisco has issued an urgent security alert after identifying a previously unknown remote code execution flaw being...
Read More Read more about Cisco Unified Communications Zero-Day RCE Enables Root Access
Apache Airflow Flaws Risk Exposure of Sensitive Data ChatGPT Image Jan 20, 2026, 11_53_40 PM
  • vulnerability
  • Cybersecurity
  • Secuirty Update
  • Security Advisory
  • Vulnerability Reports

Apache Airflow Flaws Risk Exposure of Sensitive Data

FHN January 21, 2026
Multiple vulnerabilities in Apache Airflow versions prior to 3.1.6 could lead to the exposure of sensitive credentials...
Read More Read more about Apache Airflow Flaws Risk Exposure of Sensitive Data
Critical WordPress Plugin Bug Puts 100K+ Sites at Risk ChatGPT Image Jan 20, 2026, 12_24_50 PM
  • wordpress
  • Application Security
  • Cybersecurity
  • Internet Security
  • Malware
  • Secuirty Update
  • Security Advisory

Critical WordPress Plugin Bug Puts 100K+ Sites at Risk

FHN January 20, 2026
A critical security vulnerability has been identified in the Advanced Custom Fields: Extended WordPress plugin, exposing more...
Read More Read more about Critical WordPress Plugin Bug Puts 100K+ Sites at Risk
𝗠𝗰𝗗𝗼𝗻𝗮𝗹𝗱’𝘀 𝗜𝗻𝗱𝗶𝗮 𝗧𝗮𝗿𝗴𝗲𝘁𝗲𝗱 𝗯𝘆 𝗘𝘃𝗲𝗿𝗲𝘀𝘁 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲 ChatGPT Image Jan 20, 2026, 12_15_23 PM
  • Cybersecurity
  • Application Security
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

𝗠𝗰𝗗𝗼𝗻𝗮𝗹𝗱’𝘀 𝗜𝗻𝗱𝗶𝗮 𝗧𝗮𝗿𝗴𝗲𝘁𝗲𝗱 𝗯𝘆 𝗘𝘃𝗲𝗿𝗲𝘀𝘁 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲

FHN January 20, 2026
The Everest ransomware group is claiming a significant breach involving McDonald’s India, alleging that hundreds of gigabytes...
Read More Read more about 𝗠𝗰𝗗𝗼𝗻𝗮𝗹𝗱’𝘀 𝗜𝗻𝗱𝗶𝗮 𝗧𝗮𝗿𝗴𝗲𝘁𝗲𝗱 𝗯𝘆 𝗘𝘃𝗲𝗿𝗲𝘀𝘁 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲
VoidLink Signals a New Era of Linux Rootkits in Cloud Environments ChatGPT Image Jan 20, 2026, 11_54_53 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

VoidLink Signals a New Era of Linux Rootkits in Cloud Environments

FHN January 20, 2026
VoidLink has emerged as a serious threat to Linux-based cloud infrastructure, marking a clear shift in how...
Read More Read more about VoidLink Signals a New Era of Linux Rootkits in Cloud Environments
Critical Privilege Escalation Vulnerabilities Discovered in Google Vertex AI google-vertex-ai-768x466
  • Cybersecurity
  • Application Security
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Critical Privilege Escalation Vulnerabilities Discovered in Google Vertex AI

FHN January 19, 2026
Default Service Agent Permissions Expose High-Risk Identity Paths Security researchers have uncovered critical privilege escalation vulnerabilities in...
Read More Read more about Critical Privilege Escalation Vulnerabilities Discovered in Google Vertex AI
Android Volume Button Bug Tied to Select to Speak Feature android-password-manager-hacked
  • Security Advisory
  • Android malware
  • Application Security
  • Cybersecurity
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update

Android Volume Button Bug Tied to Select to Speak Feature

FHN January 19, 2026
Google has confirmed an Android bug that affects how volume buttons behave when the Select to Speak...
Read More Read more about Android Volume Button Bug Tied to Select to Speak Feature
Security Bypass Issue Found in Windows Remote Assistance ChatGPT Image Jan 15, 2026, 08_24_06 PM
  • windows
  • Cybersecurity
  • Internet Security
  • Microsoft
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Security Bypass Issue Found in Windows Remote Assistance

FHN January 16, 2026
Microsoft has addressed a security weakness in Windows Remote Assistance that could allow attackers to bypass built-in...
Read More Read more about Security Bypass Issue Found in Windows Remote Assistance
Critical Cal.com Vulnerability Enables Account Takeover ChatGPT Image Jan 15, 2026, 08_12_15 PM
  • Vulnerability Reports
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • vulnerability

Critical Cal.com Vulnerability Enables Account Takeover

FHN January 16, 2026
A newly disclosed critical vulnerability in Cal.com, an open-source scheduling and booking platform, could allow attackers to...
Read More Read more about Critical Cal.com Vulnerability Enables Account Takeover
DragonForce Ransomware Targets ESXi and Windows Systems ChatGPT Image Jan 15, 2026, 12_32_26 PM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Ransomware
  • Secuirty Update
  • Security Advisory

DragonForce Ransomware Targets ESXi and Windows Systems

FHN January 15, 2026
Security researchers have released a detailed technical analysis of the DragonForce ransomware, along with confirmation that working...
Read More Read more about DragonForce Ransomware Targets ESXi and Windows Systems
Palo Alto Networks Fixes Firewall DoS Vulnerability ChatGPT Image Jan 15, 2026, 03_22_38 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Tips

Palo Alto Networks Fixes Firewall DoS Vulnerability

FHN January 15, 2026
Palo Alto Networks has released security updates to fix a denial-of-service (DoS) vulnerability in its PAN-OS firewall...
Read More Read more about Palo Alto Networks Fixes Firewall DoS Vulnerability
Elastic Security Updates Address File Theft and DoS Risks ChatGPT Image Jan 14, 2026, 04_29_01 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • vulnerability
  • Vulnerability Reports

Elastic Security Updates Address File Theft and DoS Risks

FHN January 14, 2026
Elastic has released new security updates to fix multiple vulnerabilities across its platform, including a high-severity issue...
Read More Read more about Elastic Security Updates Address File Theft and DoS Risks
ServiceNow AI Platform Privilege Escalation Vulnerability ChatGPT Image Jan 13, 2026, 08_18_30 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

ServiceNow AI Platform Privilege Escalation Vulnerability

FHN January 13, 2026
A serious security issue has been identified in the ServiceNow AI Platform, exposing organizations to the risk...
Read More Read more about ServiceNow AI Platform Privilege Escalation Vulnerability
SAP January 2026 Patch Day: Critical Fixes 8eb91efc-2df6-4a64-9d06-d382732aabe5
  • vulnerability
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

SAP January 2026 Patch Day: Critical Fixes

FHN January 13, 2026
SAP has released its January 2026 Security Patch Day updates, publishing 17 new security notes on January...
Read More Read more about SAP January 2026 Patch Day: Critical Fixes
Instagram Says No Breach After Password Reset Issue ChatGPT Image Jan 12, 2026, 12_34_27 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Tips

Instagram Says No Breach After Password Reset Issue

FHN January 12, 2026
Instagram has confirmed that its platform was not compromised after a wave of unexpected password reset emails...
Read More Read more about Instagram Says No Breach After Password Reset Issue
Researchers Track IPs and Domains Linked to Carding Markets ChatGPT Image Jan 12, 2026, 12_12_42 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Tips

Researchers Track IPs and Domains Linked to Carding Markets

FHN January 12, 2026
Recent research has shed light on how underground carding markets operate online. Investigators identified 28 active IP...
Read More Read more about Researchers Track IPs and Domains Linked to Carding Markets
React2Shell Vulnerability Under Mass Exploitation ChatGPT Image Jan 8, 2026, 12_37_29 PM
  • Bug Bounty
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

React2Shell Vulnerability Under Mass Exploitation

FHN January 8, 2026
The React2Shell vulnerability (CVE-2025-55182) continues to be heavily targeted, with attackers launching more than 8.1 million attack...
Read More Read more about React2Shell Vulnerability Under Mass Exploitation
LockBit 5.0 Adds New Evasion Techniques ChatGPT Image Jan 7, 2026, 05_39_40 AM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Tips

LockBit 5.0 Adds New Evasion Techniques

FHN January 7, 2026
LockBit 5.0 has appeared as the newest version of one of the most active ransomware groups in...
Read More Read more about LockBit 5.0 Adds New Evasion Techniques
Chrome Extension Used to Steal AI Chat Data ChatGPT Image Jan 7, 2026, 05_24_36 AM
  • Malicious extension
  • Cybersecurity
  • google
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Chrome Extension Used to Steal AI Chat Data

FHN January 7, 2026
More than 900,000 Chrome users were impacted by two harmful browser extensions that quietly collected AI chat...
Read More Read more about Chrome Extension Used to Steal AI Chat Data
Flaw in Chrome WebView Exposes Security Controls ChatGPT Image Jan 7, 2026, 01_49_41 AM
  • Security Advisory
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update

Flaw in Chrome WebView Exposes Security Controls

FHN January 7, 2026
Google has released an urgent security update for the Chrome browser to fix a high-severity vulnerability that...
Read More Read more about Flaw in Chrome WebView Exposes Security Controls
Infostealers Lead to Cloud Account Compromises ChatGPT Image Jan 6, 2026, 01_51_54 AM
  • Malware
  • cloud
  • Cybersecurity
  • infostealer
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Targeted Attacks

Infostealers Lead to Cloud Account Compromises

FHN January 6, 2026
Several large organizations worldwide have been breached after attackers reused stolen login details collected by infostealer malware....
Read More Read more about Infostealers Lead to Cloud Account Compromises
Security Flaws in Eaton Products May Allow Code Execution ChatGPT Image Jan 5, 2026, 04_45_18 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Security Flaws in Eaton Products May Allow Code Execution

FHN January 5, 2026
Eaton has released a security advisory after identifying multiple vulnerabilities in its UPS Companion (EUC) software. If...
Read More Read more about Security Flaws in Eaton Products May Allow Code Execution
Phishing Campaign Exploits Google Tasks Feature ChatGPT Image Jan 5, 2026, 12_56_54 AM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Phishing Campaign Exploits Google Tasks Feature

FHN January 5, 2026
In December 2025, a phishing campaign hit over 3,000 organizations, mostly in manufacturing. The attackers used Google’s...
Read More Read more about Phishing Campaign Exploits Google Tasks Feature
Apache NuttX Bug Allows Remote System Crashes ChatGPT Image Jan 2, 2026, 03_50_56 AM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • vulnerability
  • Vulnerability Reports

Apache NuttX Bug Allows Remote System Crashes

FHN January 2, 2026
A newly disclosed vulnerability in Apache NuttX RTOS could allow attackers to crash systems or trigger unexpected...
Read More Read more about Apache NuttX Bug Allows Remote System Crashes
ErrTraffic Tool Automates ClickFix Cyber Attacks ChatGPT Image Jan 2, 2026, 12_35_48 AM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

ErrTraffic Tool Automates ClickFix Cyber Attacks

FHN January 2, 2026
Cybercrime activity is increasingly shaped by automation and repeatable services. Researchers at Hudson Rock have identified ErrTraffic...
Read More Read more about ErrTraffic Tool Automates ClickFix Cyber Attacks
GlassWorm malware uses malicious VS Code extensions to attack macOS systems ChatGPT Image Jan 1, 2026, 01_37_40 AM
  • Cybersecurity
  • Application Security
  • Internet Security
  • MacOS
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory

GlassWorm malware uses malicious VS Code extensions to attack macOS systems

FHN January 1, 2026
GlassWorm has returned with a dangerous new evolution, shifting its focus entirely to macOS. First discovered in...
Read More Read more about GlassWorm malware uses malicious VS Code extensions to attack macOS systems
IBM API Connect Flaw Enables Authentication Bypass ChatGPT Image Dec 31, 2025, 03_23_06 AM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • vulnerability
  • Vulnerability Reports

IBM API Connect Flaw Enables Authentication Bypass

FHN December 31, 2025
IBM has disclosed a critical security flaw in its API Connect platform that allows attackers to bypass...
Read More Read more about IBM API Connect Flaw Enables Authentication Bypass
Magecart Attack Uses 50+ Scripts to Steal Payments ChatGPT Image Dec 31, 2025, 03_06_00 AM
  • Internet Security
  • Cybersecurity
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Magecart Attack Uses 50+ Scripts to Steal Payments

FHN December 31, 2025
A newly uncovered Magecart operation shows how web-based attacks on online stores are becoming more advanced. Magecart...
Read More Read more about Magecart Attack Uses 50+ Scripts to Steal Payments
CISA Warns: MongoDB (CVE-2025-14847) Flaw ChatGPT Image Dec 30, 2025, 12_22_44 PM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • vulnerability
  • Vulnerability Reports

CISA Warns: MongoDB (CVE-2025-14847) Flaw

FHN December 30, 2025
CISA has flagged a serious security issue affecting MongoDB Server and confirmed that it is being actively...
Read More Read more about CISA Warns: MongoDB (CVE-2025-14847) Flaw
AI-Driven Phishing Kit Targets Microsoft Accounts ChatGPT Image Dec 30, 2025, 01_00_28 AM
  • AI Malware
  • Cybersecurity
  • Email servers
  • Internet Security
  • malicious cyber actors
  • Microsoft
  • Mobile Security
  • OpenAI
  • phishing
  • Secuirty Update
  • Security Advisory

AI-Driven Phishing Kit Targets Microsoft Accounts

FHN December 30, 2025
Since March 2025, attackers running a Spanish-language phishing campaign have been going after Microsoft Outlook accounts. The...
Read More Read more about AI-Driven Phishing Kit Targets Microsoft Accounts
Windows Kernel and Named Pipe Flaws Enable Privilege Escalation ChatGPT Image Dec 29, 2025, 05_10_46 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Software Issues

Windows Kernel and Named Pipe Flaws Enable Privilege Escalation

FHN December 29, 2025
Windows privilege escalation remains a common technique used by attackers to gain deeper control of a system....
Read More Read more about Windows Kernel and Named Pipe Flaws Enable Privilege Escalation
Hackers Claim Access to WIRED Subscriber Database ChatGPT Image Dec 29, 2025, 01_59_55 AM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Tips

Hackers Claim Access to WIRED Subscriber Database

FHN December 29, 2025
A massive data leak linked to WIRED has surfaced online, exposing personal information tied to more than...
Read More Read more about Hackers Claim Access to WIRED Subscriber Database
Users Report Major Losses After TrustWallet Extension Hack ChatGPT Image Dec 26, 2025, 11_53_39 AM
  • Tips
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Users Report Major Losses After TrustWallet Extension Hack

FHN December 26, 2025
A security issue in the Trust Wallet Chrome extension led to losses of more than $7 million....
Read More Read more about Users Report Major Losses After TrustWallet Extension Hack
Users Can Now Change Their Gmail Email Address ChatGPT Image Dec 25, 2025, 11_12_12 PM
  • Security Advisory
  • Application Security
  • Cybersecurity
  • google
  • Internet Security
  • Mobile Security
  • Secuirty Update

Users Can Now Change Their Gmail Email Address

FHN December 26, 2025
For a long time, Gmail users had only one option if they wanted a new email address:...
Read More Read more about Users Can Now Change Their Gmail Email Address
Microsoft Teams to Enforce Messaging Safety Defaults ChatGPT Image Dec 25, 2025, 12_18_51 AM
  • Tips
  • Application Security
  • Cybersecurity
  • Internet Security
  • Microsoft
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Microsoft Teams to Enforce Messaging Safety Defaults

FHN December 25, 2025
Microsoft is making Microsoft Teams safer by default. Beginning January 12, 2026, the platform will automatically apply...
Read More Read more about Microsoft Teams to Enforce Messaging Safety Defaults
Hackers Abuse ClickFix Technique to Hide Images ChatGPT Image Dec 23, 2025, 03_51_23 AM
  • Cybersecurity
  • Application Security
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Hackers Abuse ClickFix Technique to Hide Images

FHN December 23, 2025
Threat actors are using a new attack method that combines ClickFix social engineering with image steganography to...
Read More Read more about Hackers Abuse ClickFix Technique to Hide Images
Malicious NPM Package Targets WhatsApp Messages ChatGPT Image Dec 23, 2025, 12_09_06 AM
  • malicious cyber actors
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Malicious NPM Package Targets WhatsApp Messages

FHN December 23, 2025
A malicious npm package called “lotusbail” has been secretly stealing WhatsApp messages and user data from developers...
Read More Read more about Malicious NPM Package Targets WhatsApp Messages
Marquis Data Breach Exposes Hundreds of Thousands of Bank Customers ChatGPT Image Dec 22, 2025, 05_44_58 AM
  • Application Security
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory

Marquis Data Breach Exposes Hundreds of Thousands of Bank Customers

FHN December 22, 2025
A major data breach at Marquis has compromised the personal information of hundreds of thousands of bank...
Read More Read more about Marquis Data Breach Exposes Hundreds of Thousands of Bank Customers
GitHub Copilot Gets Claude Opus 4.5 Integration ChatGPT Image Dec 21, 2025, 12_32_24 PM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Tips

GitHub Copilot Gets Claude Opus 4.5 Integration

FHN December 22, 2025
GitHub has officially introduced Claude Opus 4.5, Anthropic’s latest flagship AI model, into its Copilot platform. With...
Read More Read more about GitHub Copilot Gets Claude Opus 4.5 Integration
𝗖𝗶𝘀𝗰𝗼 𝗔𝘀𝘆𝗻𝗰𝗢𝗦 𝟬-𝗗𝗮𝘆 𝗨𝗻𝗱𝗲𝗿 𝗔𝗰𝘁𝗶𝘃𝗲 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗮𝘁𝗶𝗼𝗻 Screenshot 2025-12-18 002706
  • Cyber threat
  • cisco
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • vulnerability

𝗖𝗶𝘀𝗰𝗼 𝗔𝘀𝘆𝗻𝗰𝗢𝗦 𝟬-𝗗𝗮𝘆 𝗨𝗻𝗱𝗲𝗿 𝗔𝗰𝘁𝗶𝘃𝗲 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗮𝘁𝗶𝗼𝗻

FHN December 18, 2025
An active zero-day exploit in Cisco AsyncOS is being used to target Secure Email Gateway and Secure...
Read More Read more about 𝗖𝗶𝘀𝗰𝗼 𝗔𝘀𝘆𝗻𝗰𝗢𝗦 𝟬-𝗗𝗮𝘆 𝗨𝗻𝗱𝗲𝗿 𝗔𝗰𝘁𝗶𝘃𝗲 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗮𝘁𝗶𝗼𝗻
𝗙𝗼𝗿𝘂𝗺𝗧𝗿𝗼𝗹 𝗨𝘀𝗲𝘀 𝗖𝗵𝗿𝗼𝗺𝗲 𝟬-𝗗𝗮𝘆 𝗶𝗻 𝗡𝗲𝘄 𝗣𝗵𝗶𝘀𝗵𝗶𝗻𝗴 𝗖𝗮𝗺𝗽𝗮𝗶𝗴𝗻 ChatGPT Image Dec 17, 2025, 06_53_06 PM
  • phishing
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Secuirty Update
  • Security Advisory

𝗙𝗼𝗿𝘂𝗺𝗧𝗿𝗼𝗹 𝗨𝘀𝗲𝘀 𝗖𝗵𝗿𝗼𝗺𝗲 𝟬-𝗗𝗮𝘆 𝗶𝗻 𝗡𝗲𝘄 𝗣𝗵𝗶𝘀𝗵𝗶𝗻𝗴 𝗖𝗮𝗺𝗽𝗮𝗶𝗴𝗻

FHN December 18, 2025
Operation ForumTrol has launched a new phishing campaign aimed at Russian political scientists and academic researchers. The...
Read More Read more about 𝗙𝗼𝗿𝘂𝗺𝗧𝗿𝗼𝗹 𝗨𝘀𝗲𝘀 𝗖𝗵𝗿𝗼𝗺𝗲 𝟬-𝗗𝗮𝘆 𝗶𝗻 𝗡𝗲𝘄 𝗣𝗵𝗶𝘀𝗵𝗶𝗻𝗴 𝗖𝗮𝗺𝗽𝗮𝗶𝗴𝗻
𝗔𝗽𝗽𝗹𝗲 𝗪𝗲𝗯𝗞𝗶𝘁 𝟬-𝗗𝗮𝘆 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗲𝗱, 𝗖𝗜𝗦𝗔 𝗪𝗮𝗿𝗻𝘀 ChatGPT Image Dec 16, 2025, 01_39_48 PM
  • Cybersecurity
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • vulnerability
  • Vulnerability Reports

𝗔𝗽𝗽𝗹𝗲 𝗪𝗲𝗯𝗞𝗶𝘁 𝟬-𝗗𝗮𝘆 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗲𝗱, 𝗖𝗜𝗦𝗔 𝗪𝗮𝗿𝗻𝘀

FHN December 17, 2025
CISA has issued an urgent alert about a critical zero-day vulnerability in Apple WebKit that is being...
Read More Read more about 𝗔𝗽𝗽𝗹𝗲 𝗪𝗲𝗯𝗞𝗶𝘁 𝟬-𝗗𝗮𝘆 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗲𝗱, 𝗖𝗜𝗦𝗔 𝗪𝗮𝗿𝗻𝘀
Microsoft Shares Fixes for React2Shell RCE Flaw ChatGPT Image Dec 16, 2025, 12_47_32 PM
  • Cybersecurity
  • Application Security
  • Microsoft
  • vulnerability
  • Vulnerability Reports

Microsoft Shares Fixes for React2Shell RCE Flaw

FHN December 17, 2025
Microsoft has released security guidance to address a critical vulnerability called React2Shell (CVE-2025-55182). The issue affects applications...
Read More Read more about Microsoft Shares Fixes for React2Shell RCE Flaw
Frogblight Android Malware Steals SMS & Device Data android-password-manager-hacked
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Frogblight Android Malware Steals SMS & Device Data

FHN December 16, 2025
Frogblight is a sophisticated Android banking Trojan mainly targeting users in Turkey by pretending to be official...
Read More Read more about Frogblight Android Malware Steals SMS & Device Data
JSCEAL Malware Targeting Windows Users to Steal Credentials ChatGPT Image Dec 12, 2025, 11_16_54 AM
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

JSCEAL Malware Targeting Windows Users to Steal Credentials

FHN December 12, 2025
JSCEAL is a new threat targeting Windows users, mainly people using cryptocurrency apps or accounts with sensitive...
Read More Read more about JSCEAL Malware Targeting Windows Users to Steal Credentials
𝗩𝗦 𝗖𝗼𝗱𝗲 𝗠𝗮𝗹𝘄𝗮𝗿𝗲 𝗔𝗹𝗲𝗿𝘁: 𝗙𝗮𝗸𝗲 𝗣𝗡𝗚 𝗙𝗶𝗹𝗲𝘀 𝗛𝗶𝗱𝗶𝗻𝗴 𝗧𝗿𝗼𝗷𝗮𝗻𝘀 ChatGPT Image Dec 11, 2025, 10_10_24 AM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

𝗩𝗦 𝗖𝗼𝗱𝗲 𝗠𝗮𝗹𝘄𝗮𝗿𝗲 𝗔𝗹𝗲𝗿𝘁: 𝗙𝗮𝗸𝗲 𝗣𝗡𝗚 𝗙𝗶𝗹𝗲𝘀 𝗛𝗶𝗱𝗶𝗻𝗴 𝗧𝗿𝗼𝗷𝗮𝗻𝘀

FHN December 11, 2025
ReversingLabs has uncovered a supply-chain attack involving 19 malicious VS Code extensions.Active since February 2025, the campaign...
Read More Read more about 𝗩𝗦 𝗖𝗼𝗱𝗲 𝗠𝗮𝗹𝘄𝗮𝗿𝗲 𝗔𝗹𝗲𝗿𝘁: 𝗙𝗮𝗸𝗲 𝗣𝗡𝗚 𝗙𝗶𝗹𝗲𝘀 𝗛𝗶𝗱𝗶𝗻𝗴 𝗧𝗿𝗼𝗷𝗮𝗻𝘀
AI Detects Large-Scale Chinese Malware Network Across 5,000 Domains ChatGPT Image Dec 11, 2025, 09_53_33 AM
  • Tips
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

AI Detects Large-Scale Chinese Malware Network Across 5,000 Domains

FHN December 11, 2025
DomainTools Investigations has uncovered a rapidly growing malware network aimed at Chinese-speaking users around the world. The...
Read More Read more about AI Detects Large-Scale Chinese Malware Network Across 5,000 Domains
𝗔𝗠𝗢𝗦 𝗦𝘁𝗲𝗮𝗹𝗲𝗿 𝗦𝗽𝗿𝗲𝗮𝗱 𝘃𝗶𝗮 𝗔𝗯𝘂𝘀𝗲𝗱 𝗖𝗵𝗮𝘁𝗚𝗣𝗧 & 𝗚𝗿𝗼𝗸 𝗖𝗵𝗮𝘁𝘀 ChatGPT Image Dec 10, 2025, 12_32_47 PM
  • Malware
  • Cybersecurity
  • Internet Security
  • MacOS
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

𝗔𝗠𝗢𝗦 𝗦𝘁𝗲𝗮𝗹𝗲𝗿 𝗦𝗽𝗿𝗲𝗮𝗱 𝘃𝗶𝗮 𝗔𝗯𝘂𝘀𝗲𝗱 𝗖𝗵𝗮𝘁𝗚𝗣𝗧 & 𝗚𝗿𝗼𝗸 𝗖𝗵𝗮𝘁𝘀

FHN December 11, 2025
The cybersecurity landscape is at a worrying point. On December 5, 2025, Huntress discovered a smart attack...
Read More Read more about 𝗔𝗠𝗢𝗦 𝗦𝘁𝗲𝗮𝗹𝗲𝗿 𝗦𝗽𝗿𝗲𝗮𝗱 𝘃𝗶𝗮 𝗔𝗯𝘂𝘀𝗲𝗱 𝗖𝗵𝗮𝘁𝗚𝗣𝗧 & 𝗚𝗿𝗼𝗸 𝗖𝗵𝗮𝘁𝘀
Vishing Scam Uses Teams & QuickAssist to Deploy .NET Malware ChatGPT Image Dec 10, 2025, 02_54_17 AM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Vishing Scam Uses Teams & QuickAssist to Deploy .NET Malware

FHN December 10, 2025
A new vishing attack uses social engineering and legitimate Microsoft tools to run commands and deploy multi-stage...
Read More Read more about Vishing Scam Uses Teams & QuickAssist to Deploy .NET Malware
Android Users Hit as Hackers Push Triada via Ad Networks 7_In-this-photo-illustration-a-Android-logo-seen-displayed-on
  • Cybersecurity
  • Android malware
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Android Users Hit as Hackers Push Triada via Ad Networks

FHN December 9, 2025
Adex, an anti-fraud platform under AdTech Holding, has uncovered and shut down a long-running malware scheme tied...
Read More Read more about Android Users Hit as Hackers Push Triada via Ad Networks
Major Tech Brands to Roll Out Always-On GPS in India Soon ChatGPT Image Dec 8, 2025, 12_44_03 PM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Major Tech Brands to Roll Out Always-On GPS in India Soon

FHN December 9, 2025
India is weighing a new rule that would force all smartphones to keep GPS-based location tracking active...
Read More Read more about Major Tech Brands to Roll Out Always-On GPS in India Soon
2.15M Next.js sites are exposed and being attacked — update ASAP. 3df5aee2-058b-47b5-a768-b6ae73b1fb0b
  • React / Web Development
  • Cyber threat
  • cyberattack
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Secuirty Update
  • Security Advisory
  • Security Update

2.15M Next.js sites are exposed and being attacked — update ASAP.

FHN December 8, 2025
Security teams around the world are rushing to fix systems after a major React vulnerability was revealed:...
Read More Read more about 2.15M Next.js sites are exposed and being attacked — update ASAP.
ArrayOS AG VPN Flaw Exploited for Webshell Attacks Vulnerability-Management-Program-Best-Practices-1
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

ArrayOS AG VPN Flaw Exploited for Webshell Attacks

FHN December 5, 2025
A critical command injection vulnerability in Array Networks’ ArrayOS AG systems is being actively exploited, with confirmed...
Read More Read more about ArrayOS AG VPN Flaw Exploited for Webshell Attacks
BRICKSTORM Malware Targeting ESXi and Windows ChatGPT Image Dec 4, 2025, 11_19_48 PM
  • Malware
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

BRICKSTORM Malware Targeting ESXi and Windows

FHN December 5, 2025
Three major cyber agencies — CISA, NSA, and the Canadian Cyber Centre — have issued a new...
Read More Read more about BRICKSTORM Malware Targeting ESXi and Windows
Calendly-Themed Scam Aims at Google Workspace Credentials ChatGPT Image Dec 3, 2025, 11_45_34 PM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • Tips

Calendly-Themed Scam Aims at Google Workspace Credentials

FHN December 4, 2025
A new phishing campaign has been uncovered using fake Calendly pages to steal credentials from Google Workspace...
Read More Read more about Calendly-Themed Scam Aims at Google Workspace Credentials
Chrome 143 Update Patches 13 Vulnerabilities Allowing Code Execution Copy of Untitled Design - 1
  • google
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Chrome 143 Update Patches 13 Vulnerabilities Allowing Code Execution

FHN December 3, 2025
Google has released Chrome 143 to the Stable channel, with version 143.0.7499.40 now available for Linux and...
Read More Read more about Chrome 143 Update Patches 13 Vulnerabilities Allowing Code Execution
Apache Struts Bug Allows Disk Exhaustion Attacks ChatGPT Image Dec 2, 2025, 05_22_14 AM
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Apache Struts Bug Allows Disk Exhaustion Attacks

FHN December 2, 2025
A newly disclosed security flaw in Apache Struts could let attackers trigger disk exhaustion attacks, potentially making...
Read More Read more about Apache Struts Bug Allows Disk Exhaustion Attacks
New Outlook Glitch Prevents Excel Attachments 1730335832_outlook_medium
  • Microsoft
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

New Outlook Glitch Prevents Excel Attachments

FHN December 2, 2025
Users of the new Outlook for Windows are facing a problem where Excel attachments won’t open if...
Read More Read more about New Outlook Glitch Prevents Excel Attachments
Malicious VS Code Icon Theme Targets Windows & macOS ChatGPT Image Dec 1, 2025, 09_25_09 PM
  • malicious cyber actors
  • Cybersecurity
  • Internet Security
  • Malicious extension
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Malicious VS Code Icon Theme Targets Windows & macOS

FHN December 2, 2025
A fake VS Code extension pretending to be the Material Icon Theme was found targeting Windows and...
Read More Read more about Malicious VS Code Icon Theme Targets Windows & macOS
PoC Released for Critical Outlook Zero-Click RCE Bug ChatGPT Image Dec 1, 2025, 04_15_11 AM
  • RCE Flaw
  • Cybersecurity
  • Internet Security
  • Microsoft
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • vulnerability

PoC Released for Critical Outlook Zero-Click RCE Bug

FHN December 1, 2025
A Proof‑of‑Concept exploit has been released for a critical remote code execution vulnerability in Microsoft Outlook, tracked...
Read More Read more about PoC Released for Critical Outlook Zero-Click RCE Bug
Android Users Hit by New Albiriox Malware 04a81502-eda5-4a7e-add7-026d0befe79f
  • Cybersecurity
  • Android malware
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Android Users Hit by New Albiriox Malware

FHN December 1, 2025
Albiriox is a new Android malware that recently appeared on cybercrime forums. It offers advanced remote-access features...
Read More Read more about Android Users Hit by New Albiriox Malware
GitLab Patches Critical Auth & DoS Bugs ChatGPT Image Nov 28, 2025, 01_43_13 AM
  • Github
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

GitLab Patches Critical Auth & DoS Bugs

FHN November 28, 2025
GitLab has released important security updates for both its Community Edition (CE) and Enterprise Edition (EE) to...
Read More Read more about GitLab Patches Critical Auth & DoS Bugs
Legacy Python Bugs Enable PyPI Attacks via Domain Hijack 1d10add0-64b0-498b-85a5-79c8f9149bd2
  • Cybersecurity
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Legacy Python Bugs Enable PyPI Attacks via Domain Hijack

FHN November 28, 2025
Hidden vulnerabilities in old Python code can create serious risks for today’s development environments. A recent example...
Read More Read more about Legacy Python Bugs Enable PyPI Attacks via Domain Hijack
Microsoft Teams Guest Chat Risk Lets Attackers Bypass Security Microsoft-Teams-Security
  • Cyber threat
  • Cybersecurity
  • malicious cyber actors
  • Secuirty Update
  • Security Advisory
  • Security Update

Microsoft Teams Guest Chat Risk Lets Attackers Bypass Security

FHN November 27, 2025
A gap in Microsoft Teams’ B2B guest access allows attackers to bypass Defender for Office 365 protections,...
Read More Read more about Microsoft Teams Guest Chat Risk Lets Attackers Bypass Security
Threat Actors List iOS 26 Full-Chain 0-Day on Dark Web images
  • Security Update
  • Apple
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Zero Day Attack

Threat Actors List iOS 26 Full-Chain 0-Day on Dark Web

FHN November 27, 2025
A threat actor calling themselves ResearcherX has claimed to sell a full-chain zero-day exploit for Apple’s new...
Read More Read more about Threat Actors List iOS 26 Full-Chain 0-Day on Dark Web
Malware in Chrome Extension Found Stealing SOL via Hidden Swap Fees 3e145f38-39eb-4e46-ad9c-80c47493b262
  • Malware
  • Cybersecurity
  • Internet Security
  • Malicious extension
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Malware in Chrome Extension Found Stealing SOL via Hidden Swap Fees

FHN November 26, 2025
Security researchers at Socket discovered a deceptive Chrome extension called Crypto Copilot. It pretends to be a...
Read More Read more about Malware in Chrome Extension Found Stealing SOL via Hidden Swap Fees
Tor Enhances Security with Galois Encryption onion-over-vpn-300x225
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Tor Enhances Security with Galois Encryption

FHN November 26, 2025
The Tor Project has introduced a major upgrade to its cryptographic system, replacing its long-standing relay encryption...
Read More Read more about Tor Enhances Security with Galois Encryption
W3 Total Cache PoC Published, Putting Millions of WordPress Sites at Risk Programming and password concept
  • Security Update
  • Cybersecurity
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • wordpress

W3 Total Cache PoC Published, Putting Millions of WordPress Sites at Risk

FHN November 26, 2025
A proof-of-concept (PoC) exploit has been released for CVE-2025-9501, a critical command-injection vulnerability in W3 Total Cache,...
Read More Read more about W3 Total Cache PoC Published, Putting Millions of WordPress Sites at Risk
Threat Actors Exploit WhatsApp to Stealthily Gather User Data WhatsApp-1152259
  • Tips

Threat Actors Exploit WhatsApp to Stealthily Gather User Data

FHN November 25, 2025
A new malware campaign is actively targeting users in Brazil, using WhatsApp as the primary channel to...
Read More Read more about Threat Actors Exploit WhatsApp to Stealthily Gather User Data
Gainsight Breach Exposes Data from 200+ Organizations cyber-security-3400657_1920
  • Security Update
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Tips

Gainsight Breach Exposes Data from 200+ Organizations

FHN November 24, 2025
Salesforce has disclosed a significant security incident involving unauthorized access to customer data through compromised OAuth tokens...
Read More Read more about Gainsight Breach Exposes Data from 200+ Organizations
CISA Alerts Organizations to Oracle Identity Manager RCE Attack f2d178d3-e5bf-4d34-8d52-a9bf874f0088
  • CISA
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • vulnerability

CISA Alerts Organizations to Oracle Identity Manager RCE Attack

FHN November 23, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly identified Oracle vulnerability to its...
Read More Read more about CISA Alerts Organizations to Oracle Identity Manager RCE Attack
Hackers Use Matrix Push C2 for Malware and Browser Phishing 184738c3-2b8f-44ad-afff-fbdb73832da6
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Hackers Use Matrix Push C2 for Malware and Browser Phishing

FHN November 22, 2025
A new command-and-control system called Matrix Push C2 has become a major threat to users on all...
Read More Read more about Hackers Use Matrix Push C2 for Malware and Browser Phishing
Windows Graphics Vulnerability Opens the Door to System Hijack with a Single Image vulnerability
  • windows
  • Cybersecurity
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • Tips

Windows Graphics Vulnerability Opens the Door to System Hijack with a Single Image

FHN November 20, 2025
A serious remote code execution flaw in Microsoft’s Windows Graphics Component allows attackers to take control of...
Read More Read more about Windows Graphics Vulnerability Opens the Door to System Hijack with a Single Image
Investigation Underway: Microsoft Copilot File Processing Concern
  • Microsoft
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Investigation Underway: Microsoft Copilot File Processing Concern

FHN November 19, 2025
Microsoft has launched an investigation into a widespread issue affecting Microsoft Copilot in Microsoft 365, where users...
Read More Read more about Investigation Underway: Microsoft Copilot File Processing Concern
WhatsApp Screen-Sharing Scam Exposes Users to Data Theft images (3)
  • Compromised
  • Cybersecurity
  • Data Protection
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

WhatsApp Screen-Sharing Scam Exposes Users to Data Theft

FHN November 19, 2025
A new and rapidly growing scam is targeting WhatsApp users worldwide, exploiting the platform’s screen-sharing feature introduced...
Read More Read more about WhatsApp Screen-Sharing Scam Exposes Users to Data Theft
Cloudflare Reveals Key Technical Causes of Massive Global Outage cf-logo-v-cmyk-rev
  • cloud
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • Targeted Attacks

Cloudflare Reveals Key Technical Causes of Massive Global Outage

FHN November 19, 2025
Cloudflare released a detailed report explaining the cause of a major network outage that disrupted global internet...
Read More Read more about Cloudflare Reveals Key Technical Causes of Massive Global Outage
Attackers Can Exploit Multiple Flaws in Cisco Unified CCX to Run Commands CISA-Urges-Patching-of-Cisco-ASA-Flaw-Exploited-in-Ransomware-Attacks
  • Exploitation
  • cisco
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Attackers Can Exploit Multiple Flaws in Cisco Unified CCX to Run Commands

FHN November 18, 2025
Cisco has revealed serious security vulnerabilities in Cisco Unified Contact Center Express (Unified CCX). These issues allow...
Read More Read more about Attackers Can Exploit Multiple Flaws in Cisco Unified CCX to Run Commands
Cisco Catalyst Center Bug Lets Attackers Gain Higher Access 8efc82ae-5d1e-48c6-9eb2-f58879f1292d
  • cisco
  • Cybersecurity
  • Exploitation
  • Internet Security
  • Mobile Security
  • Regulation
  • Secuirty Update
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Cisco Catalyst Center Bug Lets Attackers Gain Higher Access

FHN November 17, 2025
Cisco has released a warning about a newly discovered high-severity vulnerability (CVE-2025-20341) affecting the Cisco Catalyst Center...
Read More Read more about Cisco Catalyst Center Bug Lets Attackers Gain Higher Access
Active Exploits Target Critical FortiWeb WAF Flaw 5cb542e0-5e63-4a7b-8703-effa3558846c
  • Exploitation
  • Cybersecurity
  • Data Protection
  • Internet Security
  • Mobile Security
  • Regulation
  • Secuirty Update
  • Security Advisory
  • Security Update
  • Tips

Active Exploits Target Critical FortiWeb WAF Flaw

FHN November 17, 2025
Fortinet has released an urgent security update for a critical vulnerability in FortiWeb Web Application Firewall (WAF)....
Read More Read more about Active Exploits Target Critical FortiWeb WAF Flaw
npm Package With 206K Downloads Steals GitHub Tokens npm-alternatives
  • Cybersecurity
  • infostealer
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

npm Package With 206K Downloads Steals GitHub Tokens

FHN November 14, 2025
On November 7, Veracode researchers found a dangerous typosquatting attack targeting developers who use GitHub Actions. A...
Read More Read more about npm Package With 206K Downloads Steals GitHub Tokens
Lite XL Text Editor Vulnerability Allows Remote Code Execution 1f09-article-210713-text-editor-body-text
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Remote code execution
  • Secuirty Update
  • Security Advisory
  • Security Update
  • vulnerability

Lite XL Text Editor Vulnerability Allows Remote Code Execution

FHN November 13, 2025
A new vulnerability has been discovered in Lite XL, a lightweight open-source text editor, that could let...
Read More Read more about Lite XL Text Editor Vulnerability Allows Remote Code Execution
New Phishing Trick Hits People Who Lost Their iPhones 1720610952511
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • phishing
  • Secuirty Update
  • Security Advisory
  • Security Update

New Phishing Trick Hits People Who Lost Their iPhones

FHN November 13, 2025
A new phishing scam is targeting iPhone users who have lost their devices, taking advantage of their...
Read More Read more about New Phishing Trick Hits People Who Lost Their iPhones
DarkComet RAT Hides Behind Fake Bitcoin Tools f34c89fe-b9b2-477f-a221-4f594431f34f
  • Cybersecurity
  • Internet Security
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

DarkComet RAT Hides Behind Fake Bitcoin Tools

FHN November 13, 2025
A newly discovered malware campaign is leveraging one of cybercriminals’ most effective lures cryptocurrency to distribute DarkComet...
Read More Read more about DarkComet RAT Hides Behind Fake Bitcoin Tools
𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗣𝗮𝘁𝗰𝗵 𝗧𝘂𝗲𝘀𝗱𝗮𝘆 – 𝗖𝗿𝗶𝘁𝗶𝗰𝗮𝗹 𝟬-𝗱𝗮𝘆 𝗣𝗮𝘁𝗰𝗵 + 𝗠𝗮𝗷𝗼𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗙𝗶𝘅𝗲𝘀 this-month-s-patch-tuesday-
  • Microsoft
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • vulnerability
  • Vulnerability Reports

𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗣𝗮𝘁𝗰𝗵 𝗧𝘂𝗲𝘀𝗱𝗮𝘆 – 𝗖𝗿𝗶𝘁𝗶𝗰𝗮𝗹 𝟬-𝗱𝗮𝘆 𝗣𝗮𝘁𝗰𝗵 + 𝗠𝗮𝗷𝗼𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗙𝗶𝘅𝗲𝘀

FHN November 12, 2025
Microsoft has released its November 2025 Patch Tuesday update, fixing 63 security vulnerabilities across its products. One...
Read More Read more about 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗣𝗮𝘁𝗰𝗵 𝗧𝘂𝗲𝘀𝗱𝗮𝘆 – 𝗖𝗿𝗶𝘁𝗶𝗰𝗮𝗹 𝟬-𝗱𝗮𝘆 𝗣𝗮𝘁𝗰𝗵 + 𝗠𝗮𝗷𝗼𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗙𝗶𝘅𝗲𝘀
Security Flaw in Ivanti Endpoint Manager Allows File Writes ac2921da-c7b9-4a74-9002-624117de15e8
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • vulnerability

Security Flaw in Ivanti Endpoint Manager Allows File Writes

FHN November 11, 2025
Ivanti has released an urgent security update for Ivanti Endpoint Manager, addressing a newly discovered high-severity flaw...
Read More Read more about Security Flaw in Ivanti Endpoint Manager Allows File Writes
Websites Compromised to Boost Hacker SEO image_870x_6477183d339a7
  • Compromised
  • Cybersecurity
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • wordpress

Websites Compromised to Boost Hacker SEO

FHN November 11, 2025
Cybercriminals are now hacking websites to insert malicious links that help boost their own search engine rankings....
Read More Read more about Websites Compromised to Boost Hacker SEO
PATCH NOW: QNAP Fixes 7 Zero-Days Exploited at Pwn2Own 2025 Critical-Vulnerability-Allows-Access-to-QNAP-NAS-Devices
  • Cybersecurity
  • Exploitation
  • Internet Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • vulnerability
  • Vulnerability Reports

PATCH NOW: QNAP Fixes 7 Zero-Days Exploited at Pwn2Own 2025

FHN November 10, 2025
QNAP has released an urgent security update after security researchers at Pwn2Own Ireland 2025 successfully hacked QNAP...
Read More Read more about PATCH NOW: QNAP Fixes 7 Zero-Days Exploited at Pwn2Own 2025
Introducing HackGPT: A New AI Engine for Pen Testing cyber security banner
  • AI Expansion
  • Cybersecurity
  • Internet Security
  • OpenAI
  • Secuirty Update
  • Security Advisory
  • Security Update

Introducing HackGPT: A New AI Engine for Pen Testing

FHN November 10, 2025
Cybersecurity teams are under constant pressure to find vulnerabilities before attackers do. Traditional penetration testing takes time,...
Read More Read more about Introducing HackGPT: A New AI Engine for Pen Testing
Google Uncovers AI-Powered Malware PROMPTFLUX Using Gemini API for Code Evasion 627f0135-ea8d-401f-97b1-8a7bc0f75ee2
  • AI Malware
  • Cyber threat
  • cyberattack
  • Cybersecurity
  • Malware
  • Tips

Google Uncovers AI-Powered Malware PROMPTFLUX Using Gemini API for Code Evasion

FHN November 6, 2025
Google has uncovered a new form of AI-assisted malware that uses its own Gemini large language model...
Read More Read more about Google Uncovers AI-Powered Malware PROMPTFLUX Using Gemini API for Code Evasion
CISA Adds Gladinet and Control Web Panel Flaws to Known Exploited Vulnerabilities List 1730467500211
  • CISA
  • cyberattack
  • Cybersecurity
  • Exploitation
  • vulnerability

CISA Adds Gladinet and Control Web Panel Flaws to Known Exploited Vulnerabilities List

FHN November 5, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new security flaws affecting Gladinet and...
Read More Read more about CISA Adds Gladinet and Control Web Panel Flaws to Known Exploited Vulnerabilities List
Microsoft Teams Vulnerabilities Expose Users to Impersonation and Social Engineering Attacks microsoft_teams
  • Cybersecurity
  • Data Protection
  • vulnerability

Microsoft Teams Vulnerabilities Expose Users to Impersonation and Social Engineering Attacks

FHN November 4, 2025
Cybersecurity researchers have revealed four critical vulnerabilities in Microsoft Teams that could have allowed attackers to impersonate...
Read More Read more about Microsoft Teams Vulnerabilities Expose Users to Impersonation and Social Engineering Attacks
Lampion Stealer Evolves: Silent Credential Theft via ClickFix Attacks d4cca814-c297-4933-8758-5ff4c6144d65
  • malicious cyber actors
  • Cybersecurity
  • Malicious extension
  • Malware
  • Secuirty Update
  • Security Advisory
  • Security Update

Lampion Stealer Evolves: Silent Credential Theft via ClickFix Attacks

FHN October 31, 2025
Researchers have discovered a new wave of attacks using the Lampion banking trojan, a malware active since...
Read More Read more about Lampion Stealer Evolves: Silent Credential Theft via ClickFix Attacks
WhatsApp Rolls Out Passkey Encryption for Backups whatsapp-updates
  • Cybersecurity
  • Internet Security
  • Mobile Security

WhatsApp Rolls Out Passkey Encryption for Backups

FHN October 31, 2025
WhatsApp has rolled out passkey-encrypted backups, a major upgrade that makes protecting chat history easier and more...
Read More Read more about WhatsApp Rolls Out Passkey Encryption for Backups
Patch Now: CISA Releases Detections for Zero-Day WSUS Exploit 904998fe-3240-45e6-b14f-94c770fafde6 (1)
  • Exploitation
  • Cybersecurity
  • Internet Security
  • Secuirty Update
  • Security Advisory
  • Security Update
  • vulnerability

Patch Now: CISA Releases Detections for Zero-Day WSUS Exploit

FHN October 30, 2025
On October 29, 2025, CISA released new guidance to help organizations detect and reduce attacks exploiting CVE-2025-59287,...
Read More Read more about Patch Now: CISA Releases Detections for Zero-Day WSUS Exploit
Phishing Attack Hides Malicious Emails with Invisible Characters Cyber Security Smart Devices. Cloud Computing Data Breach
  • phishing
  • Cybersecurity
  • Internet Security
  • malicious cyber actors
  • Secuirty Update
  • Security Advisory
  • Security Update

Phishing Attack Hides Malicious Emails with Invisible Characters

FHN October 29, 2025
Cybercriminals are using a new phishing technique that hides invisible characters in email subject lines to bypass...
Read More Read more about Phishing Attack Hides Malicious Emails with Invisible Characters
Herodotus mimics humans to bypass biometrics Android_2406158_150626
  • Cyber threat
  • Android banking trojan
  • Android malware
  • Compromised
  • Cybersecurity
  • Internet Security
  • Malware
  • Mobile Security
  • Secuirty Update
  • Security Advisory
  • Security Update

Herodotus mimics humans to bypass biometrics

FHN October 29, 2025
A sophisticated Android banking trojan called Herodotus has appeared, using new techniques to evade detection. All about...
Read More Read more about Herodotus mimics humans to bypass biometrics
OpenAI Atlas Browser Vulnerability Exposed to Prompt Injection Attack l3020250822120655
  • Data Protection
  • AI Expansion
  • Cybersecurity

OpenAI Atlas Browser Vulnerability Exposed to Prompt Injection Attack

FHN October 27, 2025
A new security flaw has been discovered in the recently released OpenAI Atlas browser. The issue was...
Read More Read more about OpenAI Atlas Browser Vulnerability Exposed to Prompt Injection Attack
PHP Variable Function Malware Targets WordPress Sites, Wordfence Reports Malware_Glossary_Header
  • Malware
  • Internet Security
  • Malicious extension
  • Security Advisory
  • Tips
  • wordpress

PHP Variable Function Malware Targets WordPress Sites, Wordfence Reports

FHN October 24, 2025
A new analysis by Wordfence security researchers has revealed a recurring malware strain that uses PHP’s variable...
Read More Read more about PHP Variable Function Malware Targets WordPress Sites, Wordfence Reports
“Jingle Thief” Cybercrime Group Targets Cloud Gift Card Systems in Retail Sector pexels-rombo-1510555-9096966
  • Cybersecurity
  • cloud
  • phishing
  • Threat Intelligence

“Jingle Thief” Cybercrime Group Targets Cloud Gift Card Systems in Retail Sector

FHN October 23, 2025
Cybersecurity researchers have uncovered a sophisticated cybercriminal operation dubbed “Jingle Thief,” which has been targeting cloud environments...
Read More Read more about “Jingle Thief” Cybercrime Group Targets Cloud Gift Card Systems in Retail Sector
Critical Adobe Commerce & Magento Vulnerability CVE-2025-54236 Under Active Attack – Apply Security Patch Now Adobe-Commerce-Banner
  • Magento Updates
  • Internet Security
  • Security Advisory
  • vulnerability
  • Vulnerability Reports

Critical Adobe Commerce & Magento Vulnerability CVE-2025-54236 Under Active Attack – Apply Security Patch Now

FHN October 23, 2025
E-commerce security experts at Sansec have issued a warning about active exploitation targeting a newly disclosed Adobe...
Read More Read more about Critical Adobe Commerce & Magento Vulnerability CVE-2025-54236 Under Active Attack – Apply Security Patch Now
Iranian Hackers Target Over 100 Government Bodies with ‘Phoenix’ Backdoor iran
  • hackers
  • Malware
  • phishing
  • Security Advisory

Iranian Hackers Target Over 100 Government Bodies with ‘Phoenix’ Backdoor

FHN October 23, 2025
A new cyber espionage campaign has been launched by an Iranian state-sponsored hacking group known as MuddyWater,...
Read More Read more about Iranian Hackers Target Over 100 Government Bodies with ‘Phoenix’ Backdoor
Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One Pwn2Own-Berlin-Day-Two-Delivers-20-Zero-Days-VMware-and-Firefox-Hacked
  • hackers
  • Ransomware
  • Security Advisory
  • Tips
  • vulnerability
  • Zero Day Attack

Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One

FHN October 22, 2025
Record-Breaking Day for Security Researchers Day One of Pwn2Own Ireland 2025 concluded with an extraordinary showcase of...
Read More Read more about Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One
Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group download-6
  • Cybersecurity
  • Data Breach
  • Ransomware
  • Security Advisory
  • Threat Intelligence
  • vulnerability
  • Zero Day Attack

Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group

FHN October 7, 2025
A critical security flaw in Oracle E-Business Suite (EBS) is being actively exploited by the Cl0p ransomware...
Read More Read more about Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group
Akira Ransomware Now Breaches MFA‑Protected SonicWall VPNs, Researchers Warn sonicwall
  • Ransomware
  • Cybersecurity
  • Data Breach
  • Malware
  • Threat Intelligence

Akira Ransomware Now Breaches MFA‑Protected SonicWall VPNs, Researchers Warn

FHN September 29, 2025
The Akira ransomware gang is now reportedly bypassing multi-factor authentication (MFA) protections on SonicWall VPN devices, according...
Read More Read more about Akira Ransomware Now Breaches MFA‑Protected SonicWall VPNs, Researchers Warn
Critical Cisco ASA and FTD Zero-Day Vulnerabilities Under Active Attack Zero-Day-Attack
  • Zero Day Attack
  • Cybersecurity
  • Internet Security

Critical Cisco ASA and FTD Zero-Day Vulnerabilities Under Active Attack

FHN September 26, 2025
Attackers Exploiting VPN and Web Services to Gain Root Access — CISA Issues Emergency Directive Two critical...
Read More Read more about Critical Cisco ASA and FTD Zero-Day Vulnerabilities Under Active Attack
ComicForm and SectorJ149 Hackers Ramp Up Eurasian Cyberattacks with Formbook Malware Deployment istockphoto-819914294-612x612
  • Cybersecurity
  • cyberattack
  • Data Breach
  • phishing
  • Threat Intelligence

ComicForm and SectorJ149 Hackers Ramp Up Eurasian Cyberattacks with Formbook Malware Deployment

FHN September 23, 2025
In a series of escalating cyber threats, two distinct hacking groups— the newly identified ComicForm and the...
Read More Read more about ComicForm and SectorJ149 Hackers Ramp Up Eurasian Cyberattacks with Formbook Malware Deployment
Massive Email Spoofing Attack Enabled by DNS Misconfiguration and MikroTik Router Hijack DNS Spoofing
  • Tips
  • Cybersecurity
  • Data Breach
  • Exploitation
  • Malware
  • phishing

Massive Email Spoofing Attack Enabled by DNS Misconfiguration and MikroTik Router Hijack

FHN September 22, 2025
A large-scale cyberattack has been uncovered. The attack was enabled by DNS misconfigurations across global networks. Over...
Read More Read more about Massive Email Spoofing Attack Enabled by DNS Misconfiguration and MikroTik Router Hijack
Google Chrome Zero-Day Vulnerability Exploited in the Wild: Urgent Update Required to Patch CVE-2025-10585 Untitled-design-11
  • vulnerability
  • google
  • Zero Day Attack

Google Chrome Zero-Day Vulnerability Exploited in the Wild: Urgent Update Required to Patch CVE-2025-10585

FHN September 18, 2025
Google has issued an emergency security update for its Chrome browser following the discovery of a critical...
Read More Read more about Google Chrome Zero-Day Vulnerability Exploited in the Wild: Urgent Update Required to Patch CVE-2025-10585
Gentlemen Ransomware: Exploiting Drivers and Policies in Sophisticated Cyber Attacks Ransomware_marcos_alvarado_Alamy
  • cyberattack
  • Cybersecurity
  • Ransomware

Gentlemen Ransomware: Exploiting Drivers and Policies in Sophisticated Cyber Attacks

FHN September 10, 2025
A newly identified ransomware group known as The Gentlemen has been targeting enterprises across 17 countries since...
Read More Read more about Gentlemen Ransomware: Exploiting Drivers and Policies in Sophisticated Cyber Attacks
China-Backed Hackers Used 45 Hidden Domains in Telecom Cyber Attacks hero-image
  • Tips
  • cyberattack
  • Cybersecurity
  • Exploitation
  • hackers

China-Backed Hackers Used 45 Hidden Domains in Telecom Cyber Attacks

FHN September 9, 2025
Threat hunters recently found 45 secret domains linked to Salt Typhoon, a China-backed hacking group. These domains,...
Read More Read more about China-Backed Hackers Used 45 Hidden Domains in Telecom Cyber Attacks
iCloud Calendar Phishing Scam: Cybercriminals Use Apple’s Servers Cdpw6TMsvTS3tPWmYuVXz6
  • Cybercriminals
  • Apple
  • Email servers
  • icloud
  • phishing

iCloud Calendar Phishing Scam: Cybercriminals Use Apple’s Servers

FHN September 8, 2025
Cybercriminals are misusing iCloud Calendar to send phishing emails from Apple’s servers. These fake emails look like...
Read More Read more about iCloud Calendar Phishing Scam: Cybercriminals Use Apple’s Servers
Hackers Launch Daring $130 Million Bank Heist Attempt on Brazilian Fintech Firm pexels-john-guccione-www-advergroup-com-1874301-3564390-scaled
  • Fintech
  • Bank Heist
  • Cybercriminals
  • hackers

Hackers Launch Daring $130 Million Bank Heist Attempt on Brazilian Fintech Firm

FHN September 3, 2025
In a shocking cybersecurity incident that highlights the growing threats to global financial systems, hackers recently targeted...
Read More Read more about Hackers Launch Daring $130 Million Bank Heist Attempt on Brazilian Fintech Firm
Zscaler Data Breach 2025: Customer Names, Emails, and Support Data Exposed in SalesLoft and Drift Hack Zscaler,Logo,Sign,On,Hq,Campus,Building,In,Silicon,Valley.
  • Data Breach
  • Cybersecurity
  • Data Protection
  • hackers
  • phishing

Zscaler Data Breach 2025: Customer Names, Emails, and Support Data Exposed in SalesLoft and Drift Hack

FHN September 2, 2025
In a major cybersecurity incident shaking the tech world, Zscaler, a leading cloud security provider, has confirmed...
Read More Read more about Zscaler Data Breach 2025: Customer Names, Emails, and Support Data Exposed in SalesLoft and Drift Hack
Meet SafeLine: The Future of Free Zero Trust Web Security in 2026 images
  • Cybersecurity
  • Web application security
  • Zero Trust

Meet SafeLine: The Future of Free Zero Trust Web Security in 2026

FHN August 20, 2025
Every organization – whether it’s a global enterprise with thousands of employees or an individual tech enthusiast...
Read More Read more about Meet SafeLine: The Future of Free Zero Trust Web Security in 2026
New Malware “ClickFix” Targets macOS Users to Steal Login Credentials kk
  • Cybersecurity
  • Malware

New Malware “ClickFix” Targets macOS Users to Steal Login Credentials

FHN August 11, 2025
In recent months, security researchers have identified a new phishing campaign aimed at macOS users, disguised as...
Read More Read more about New Malware “ClickFix” Targets macOS Users to Steal Login Credentials
Malicious Packages Target RubyGems and PyPI: Stealing Credentials and Crypto, Leading to Security Overhaul jj
  • Cybersecurity
  • cyberattack
  • Malware

Malicious Packages Target RubyGems and PyPI: Stealing Credentials and Crypto, Leading to Security Overhaul

FHN August 8, 2025
A new set of 60 malicious packages targeting the RubyGems ecosystem has been discovered. These packages masquerade...
Read More Read more about Malicious Packages Target RubyGems and PyPI: Stealing Credentials and Crypto, Leading to Security Overhaul
Malicious Go and npm Packages Spread Cross-Platform Malware, Enable Remote Data Wipes 33
  • Cybersecurity
  • Malware

Malicious Go and npm Packages Spread Cross-Platform Malware, Enable Remote Data Wipes

FHN August 7, 2025
Cybersecurity researchers have identified 11 malicious Go packages engineered to download and execute additional payloads from remote...
Read More Read more about Malicious Go and npm Packages Spread Cross-Platform Malware, Enable Remote Data Wipes
Mozilla Issues Warning About Phishing Attacks Targeting Add-on Developer Accounts tt
  • Cybersecurity
  • cyberattack

Mozilla Issues Warning About Phishing Attacks Targeting Add-on Developer Accounts

FHN August 4, 2025
Mozilla has issued an urgent security alert to its developer community after identifying a sophisticated phishing campaign...
Read More Read more about Mozilla Issues Warning About Phishing Attacks Targeting Add-on Developer Accounts
Cybercriminals Are Using Free EDR Trials to Disable Your Current EDR edr
  • Cybersecurity
  • Malware

Cybercriminals Are Using Free EDR Trials to Disable Your Current EDR

FHN August 1, 2025
A sophisticated attack technique has emerged in which cybercriminals exploit free trials of Endpoint Detection and Response...
Read More Read more about Cybercriminals Are Using Free EDR Trials to Disable Your Current EDR
Apple Fixes Safari Security Flaw Also Targeted in Recent Chrome Zero-Day Exploit oo
  • Cybersecurity
  • Secuirty Update
  • Security Update
  • vulnerability
  • Zero Day Attack

Apple Fixes Safari Security Flaw Also Targeted in Recent Chrome Zero-Day Exploit

FHN July 31, 2025
On Tuesday, Apple rolled out security updates for its entire software lineup, addressing a vulnerability that Google...
Read More Read more about Apple Fixes Safari Security Flaw Also Targeted in Recent Chrome Zero-Day Exploit
New Choicejacking Attack Exploits Public Chargers to Steal Data from Phones Female,Hands,Holding,And,Using,Smartphone,While,Charging,It,In
  • Mobile Security
  • Cybersecurity
  • Data Protection

New Choicejacking Attack Exploits Public Chargers to Steal Data from Phones

FHN July 30, 2025
Choicejacking is a new USB attack that tricks phones into sharing data at public charging stations, bypassing...
Read More Read more about New Choicejacking Attack Exploits Public Chargers to Steal Data from Phones
Hackers Compromise Toptal’s GitHub, Release 10 Malicious npm Packages With 5,000 Downloads t
  • Cyber threat
  • Data Breach
  • Github

Hackers Compromise Toptal’s GitHub, Release 10 Malicious npm Packages With 5,000 Downloads

FHN July 29, 2025
In the latest example of a software supply chain attack, unidentified threat actors breached Toptal’s GitHub organization...
Read More Read more about Hackers Compromise Toptal’s GitHub, Release 10 Malicious npm Packages With 5,000 Downloads
A massive data breach on the Leak Zone Dark Web forum has resulted in the exposure of sensitive information, including the IP addresses and geographical locations of over 22 million users ib
  • Data Breach

A massive data breach on the Leak Zone Dark Web forum has resulted in the exposure of sensitive information, including the IP addresses and geographical locations of over 22 million users

FHN July 28, 2025
A significant cybersecurity breach has compromised the privacy of users accessing one of the internet’s most infamous...
Read More Read more about A massive data breach on the Leak Zone Dark Web forum has resulted in the exposure of sensitive information, including the IP addresses and geographical locations of over 22 million users
New Phishing Scam Imitates Facebook Login Page to Harvest User Credentials oo
  • Data Breach
  • Malware
  • phishing

New Phishing Scam Imitates Facebook Login Page to Harvest User Credentials

FHN July 25, 2025
A fast-growing phishing campaign is leveraging a Browser-in-the-Browser (BitB) overlay to mimic Facebook’s login page and steal...
Read More Read more about New Phishing Scam Imitates Facebook Login Page to Harvest User Credentials
Stealthy Backdoor Discovered in WordPress Plugins Grants Hackers Long-Term Website Access uu
  • Malware
  • Backdoor
  • wordpress

Stealthy Backdoor Discovered in WordPress Plugins Grants Hackers Long-Term Website Access

FHN July 24, 2025
A highly sophisticated WordPress malware campaign has been uncovered, exploiting the seldom-monitored mu-plugins (must-use plugins) directory to...
Read More Read more about Stealthy Backdoor Discovered in WordPress Plugins Grants Hackers Long-Term Website Access
Google Launches OSS Rebuild to Detect Malicious Code in Popular Open-Source Software gg
  • Malware

Google Launches OSS Rebuild to Detect Malicious Code in Popular Open-Source Software

FHN July 23, 2025
Google has unveiled a new initiative called OSS Rebuild, aimed at strengthening the security of open-source package...
Read More Read more about Google Launches OSS Rebuild to Detect Malicious Code in Popular Open-Source Software
New DCHSpy Malware Targets Android: Steals WhatsApp Data, Call Logs, and More ff
  • cyberattack
  • Android malware
  • Malware

New DCHSpy Malware Targets Android: Steals WhatsApp Data, Call Logs, and More

FHN July 22, 2025
“A New DCHSpy Variant Unveiled: Iranian Cyber Group MuddyWater Targets Mobile Data Amid Rising Israel-Iran Tensions” This...
Read More Read more about New DCHSpy Malware Targets Android: Steals WhatsApp Data, Call Logs, and More
CoinDCX Hack: $44.2 Million Drained from the Platform ff
  • cyberattack

CoinDCX Hack: $44.2 Million Drained from the Platform

FHN July 21, 2025
On July 19, 2025, CoinDCX, India’s second-largest cryptocurrency exchange, confirmed a sophisticated security breach that led to...
Read More Read more about CoinDCX Hack: $44.2 Million Drained from the Platform
CISA Issues Three ICS Advisories Addressing Vulnerabilities and Exploitation Risks cc
  • vulnerability
  • CISA

CISA Issues Three ICS Advisories Addressing Vulnerabilities and Exploitation Risks

FHN July 18, 2025
On July 17, 2025, CISA released three important advisories concerning Industrial Control Systems (ICS), targeting critical vulnerabilities...
Read More Read more about CISA Issues Three ICS Advisories Addressing Vulnerabilities and Exploitation Risks
Google’s AI tool Big Sleep has discovered a critical zero-day vulnerability in SQLite and has successfully blocked its active exploitation uu
  • Zero Day Attack
  • vulnerability

Google’s AI tool Big Sleep has discovered a critical zero-day vulnerability in SQLite and has successfully blocked its active exploitation

FHN July 17, 2025
Google’s cutting-edge AI-driven security tool, Big Sleep, has reached a major milestone by identifying and halting the...
Read More Read more about Google’s AI tool Big Sleep has discovered a critical zero-day vulnerability in SQLite and has successfully blocked its active exploitation
Octalyn Stealer Collects VPN Configs, Passwords, and Cookies into Organized Folder Structures yy
  • Malware
  • vulnerability

Octalyn Stealer Collects VPN Configs, Passwords, and Cookies into Organized Folder Structures

FHN July 16, 2025
A sophisticated new credential stealer has surfaced on GitHub, masquerading as a legitimate forensic toolkit while targeting...
Read More Read more about Octalyn Stealer Collects VPN Configs, Passwords, and Cookies into Organized Folder Structures
Red Bull-Themed Phishing Scams Target Job Seekers to Steal Login Credentials red
  • cyberattack
  • phishing

Red Bull-Themed Phishing Scams Target Job Seekers to Steal Login Credentials

FHN July 15, 2025
A new wave of phishing emails is circulating globally, posing as offers for a “Social Media Manager”...
Read More Read more about Red Bull-Themed Phishing Scams Target Job Seekers to Steal Login Credentials
Google Gemini Workspace Vulnerability Allows Attackers to Conceal Malicious Scripts in Emails gem
  • Malware
  • Data Breach
  • phishing
  • vulnerability

Google Gemini Workspace Vulnerability Allows Attackers to Conceal Malicious Scripts in Emails

FHN July 14, 2025
Security researchers have identified a critical vulnerability in Google Gemini for Workspace that allows attackers to insert...
Read More Read more about Google Gemini Workspace Vulnerability Allows Attackers to Conceal Malicious Scripts in Emails
Microsoft Remote Desktop Client Vulnerability Allowed Attackers to Execute Remote Code mm
  • vulnerability
  • Secuirty Update

Microsoft Remote Desktop Client Vulnerability Allowed Attackers to Execute Remote Code

FHN July 9, 2025
A critical security flaw in Microsoft Remote Desktop Client, identified as CVE-2025-48817, could enable attackers to execute...
Read More Read more about Microsoft Remote Desktop Client Vulnerability Allowed Attackers to Execute Remote Code
WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control im
  • Malware
  • cyberattack
  • phishing
  • Website Security
  • wordpress

WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control

FHN July 6, 2025
A new wave of cyberattacks is actively compromising WordPress websites through the use of malicious SEO plugins...
Read More Read more about WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control
Linux at Risk: Critical Sudo Vulnerabilities Enable Root Access for Local Attackers li
  • Secuirty Update
  • Data Breach
  • vulnerability

Linux at Risk: Critical Sudo Vulnerabilities Enable Root Access for Local Attackers

FHN July 5, 2025
Cybersecurity researchers have uncovered two security vulnerabilities in the Sudo command-line utility used in Linux and Unix-like...
Read More Read more about Linux at Risk: Critical Sudo Vulnerabilities Enable Root Access for Local Attackers
CrowdStrike Services has observed SCATTERED SPIDER escalating its attacks across multiple industries CrowdStrike_Cover_1280x580
  • cyberattack
  • Ransomware

CrowdStrike Services has observed SCATTERED SPIDER escalating its attacks across multiple industries

FHN July 4, 2025
CrowdStrike Services outlines the techniques used by SCATTERED SPIDER in attacks targeting the aviation, insurance, and retail...
Read More Read more about CrowdStrike Services has observed SCATTERED SPIDER escalating its attacks across multiple industries
Critical Vulnerability in Anthropic’s MCP Inspector Exposes AI Developers to Remote Exploits Flux_Dev_A_futuristic_and_ominous_digital_illustration_depicti_0
  • Zero Day Attack
  • cyberattack
  • vulnerability

Critical Vulnerability in Anthropic’s MCP Inspector Exposes AI Developers to Remote Exploits

FHN July 2, 2025
A critical security flaw in Anthropic’s Model Context Protocol (MCP) Inspector tool, identified as CVE-2025-49596, has raised...
Read More Read more about Critical Vulnerability in Anthropic’s MCP Inspector Exposes AI Developers to Remote Exploits
Cyber Fattah’s Saudi Games Breach: A New Front in Middle East Cyber Warfare saudi games
  • Data Breach
  • cyberattack

Cyber Fattah’s Saudi Games Breach: A New Front in Middle East Cyber Warfare

FHN June 26, 2025
Pro-Iranian Hacktivist Group Leaks Sensitive Data from Major Sporting Event In a significant cyber incident that underscores...
Read More Read more about Cyber Fattah’s Saudi Games Breach: A New Front in Middle East Cyber Warfare
Microsoft Boosts Windows 10 Security with Updates Until 2026 Gemini_Generated_Image_lzbwwlzbwwlzbwwl
  • Security Update
  • windows

Microsoft Boosts Windows 10 Security with Updates Until 2026

FHN June 25, 2025
Microsoft has unveiled plans to extend security updates for Windows 10 until October 13, 2026, offering critical...
Read More Read more about Microsoft Boosts Windows 10 Security with Updates Until 2026
U.S. House Bans WhatsApp on Official Devices Citing Security Risks whatsapp-logo-phone-close
  • Security Advisory
  • Security Update

U.S. House Bans WhatsApp on Official Devices Citing Security Risks

FHN June 24, 2025
In a decisive move highlighting growing concerns over digital privacy and cybersecurity, the United States House of...
Read More Read more about U.S. House Bans WhatsApp on Official Devices Citing Security Risks
CoinMarketCap Hacked: Fake Web3 Popup Drains Crypto Wallets in Supply Chain Attack coinmarket
  • cyberattack
  • phishing

CoinMarketCap Hacked: Fake Web3 Popup Drains Crypto Wallets in Supply Chain Attack

FHN June 23, 2025
In a shocking cryptocurrency security breach, CoinMarketCap, the leading crypto price tracking platform, fell victim to a...
Read More Read more about CoinMarketCap Hacked: Fake Web3 Popup Drains Crypto Wallets in Supply Chain Attack
Critical Linux Vulnerabilities Expose Systems to Root Access Exploits Gemini_Generated_Image_9zaujt9zaujt9zau
  • vulnerability
  • Linux Malware

Critical Linux Vulnerabilities Expose Systems to Root Access Exploits

FHN June 19, 2025
Newly discovered Linux vulnerabilities, identified as CVE-2025-6018, CVE-2025-6019, and CVE-2025-6020, threaten major distributions like Ubuntu, Debian, Fedora,...
Read More Read more about Critical Linux Vulnerabilities Expose Systems to Root Access Exploits
Zoomcar Hit by Major Data Breach, Affecting 8.4 Million Users Gemini_Generated_Image_z4pf6cz4pf6cz4pf
  • Data Breach
  • cyberattack
  • phishing
  • Tips

Zoomcar Hit by Major Data Breach, Affecting 8.4 Million Users

FHN June 18, 2025
Zoomcar, India’s prominent car-sharing platform, has disclosed a significant data breach affecting approximately 8.4 million of its...
Read More Read more about Zoomcar Hit by Major Data Breach, Affecting 8.4 Million Users
Paddle Faces $5 Million FTC Penalty for Enabling Tech Support Fraud d86f5018-a7d0-4d26-9810-2d4bd4e0d50c
  • Scam
  • Security Advisory

Paddle Faces $5 Million FTC Penalty for Enabling Tech Support Fraud

FHN June 18, 2025
FTC Cracks Down on Payment Processor’s Role in Deceptive Schemes On June 16, 2025, the Federal Trade...
Read More Read more about Paddle Faces $5 Million FTC Penalty for Enabling Tech Support Fraud
Scattered Spider Hackers Shift Focus to U.S. Insurance Firms: Expert Analysis Flux_Dev_Create_a_dramatic_digital_illustration_showing_a_hood_1
  • Tips
  • cyberattack
  • hackers
  • phishing
  • Ransomware

Scattered Spider Hackers Shift Focus to U.S. Insurance Firms: Expert Analysis

FHN June 17, 2025
Scattered Spider Threat Looms Over Insurance Industry Google’s Threat Intelligence Group has identified multiple cybersecurity breaches in...
Read More Read more about Scattered Spider Hackers Shift Focus to U.S. Insurance Firms: Expert Analysis
Coinbase Data Breach 2025: India-Based Insider Leak Impacts 69,000 Users Coin Base Data Breach
  • Data Breach
  • Tips

Coinbase Data Breach 2025: India-Based Insider Leak Impacts 69,000 Users

FHN June 5, 2025
What is the Coinbase Data Breach All About? In June 2025, global crypto exchange Coinbase disclosed a...
Read More Read more about Coinbase Data Breach 2025: India-Based Insider Leak Impacts 69,000 Users
Apache Tomcat CGI Servlet Flaw Bypasses Security sddefault (2)
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Apache Tomcat CGI Servlet Flaw Bypasses Security

FHN May 30, 2025
A newly discovered security vulnerability, identified as CVE-2025-46701, has been found in Apache Tomcat’s CGI servlet implementation....
Read More Read more about Apache Tomcat CGI Servlet Flaw Bypasses Security
PureHVNC RAT Evades Defenses with Fake Jobs & PowerShell 360_F_1224936513_tHR4mAT8clsPQhwXdxfBA84SnsbfCukC
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

PureHVNC RAT Evades Defenses with Fake Jobs & PowerShell

FHN May 29, 2025
Netskope Threat Labs has uncovered a stealthy malware campaign delivering the PureHVNC Remote Access Trojan (RAT), using...
Read More Read more about PureHVNC RAT Evades Defenses with Fake Jobs & PowerShell
Nifty[.]com Infrastructure Exploited in Phishing Attack Phishing-Attacks_-Recognize-and-Avoid-Email-Phishing-1
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

Nifty[.]com Infrastructure Exploited in Phishing Attack

FHN May 29, 2025
Between April and May 2025, threat actors launched a multi-wave phishing campaign by exploiting the trusted infrastructure...
Read More Read more about Nifty[.]com Infrastructure Exploited in Phishing Attack
Cloud Devices Under Attack: 251 IPs Exploit 75 Flaws cloud_2
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Cloud Devices Under Attack: 251 IPs Exploit 75 Flaws

FHN May 28, 2025
On May 8, 2025, cybersecurity analysts at GreyNoise identified a large-scale and tightly coordinated scanning campaign that...
Read More Read more about Cloud Devices Under Attack: 251 IPs Exploit 75 Flaws
Evertz SDN Vulnerability Allows Arbitrary Command Execution vulnerability
  • Arbitrary Code Execution
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Evertz SDN Vulnerability Allows Arbitrary Command Execution

FHN May 28, 2025
A critical vulnerability (CVE-2025-4009) was found in Evertz’s Software Defined Video Network (SDVN) products, allowing attackers to...
Read More Read more about Evertz SDN Vulnerability Allows Arbitrary Command Execution
Mozilla Urgently Patches Firefox Pwn2Own 2025 Flaws IMG_1497
  • Internet Security
  • Exploitation
  • Regulation
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Mozilla Urgently Patches Firefox Pwn2Own 2025 Flaws

FHN May 27, 2025
At this year’s Pwn2Own Berlin, researchers revealed two new zero-day flaws in Mozilla Firefox, targeting its content...
Read More Read more about Mozilla Urgently Patches Firefox Pwn2Own 2025 Flaws
Threat Actors Use Fake DocuSign for Corporate Data Theft docusign-phishing-scams
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Threat Actors Use Fake DocuSign for Corporate Data Theft

FHN May 27, 2025
DocuSign is trusted by over 1.6 million customers, including 95% of Fortune 500 companies, and has more...
Read More Read more about Threat Actors Use Fake DocuSign for Corporate Data Theft
TI WooCommerce Wishlist Flaw: 100,000+ Sites at Risk wordpress0-1060x424-1
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips
  • wordpress

TI WooCommerce Wishlist Flaw: 100,000+ Sites at Risk

FHN May 27, 2025
A serious security issue has been discovered in the TI WooCommerce Wishlist plugin, which is used on...
Read More Read more about TI WooCommerce Wishlist Flaw: 100,000+ Sites at Risk
Linux 6.15 Released: Major Performance & Hardware Upgrades sddefault (1)
  • Internet Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

Linux 6.15 Released: Major Performance & Hardware Upgrades

FHN May 26, 2025
Linux 6.15, released on May 25, 2025, brings major updates to the open-source world with new features...
Read More Read more about Linux 6.15 Released: Major Performance & Hardware Upgrades
Fake DigiYatra Apps Steal Indian Financial Data 1682793737802
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Fake DigiYatra Apps Steal Indian Financial Data

FHN May 26, 2025
A new phishing scam is targeting Indian air travelers by pretending to be the trusted DigiYatra service....
Read More Read more about Fake DigiYatra Apps Steal Indian Financial Data
ChatGPT Deep Research Integrates Dropbox & OneDrive d267f057944b42f947926b66ebb47947
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

ChatGPT Deep Research Integrates Dropbox & OneDrive

FHN May 26, 2025
OpenAI has upgraded ChatGPT with powerful deep research features, now supporting direct integration with cloud platforms like...
Read More Read more about ChatGPT Deep Research Integrates Dropbox & OneDrive
Cisco Webex Flaw Allows HTTP Response Tampering 960x0
  • vulnerability
  • cisco
  • Internet Security
  • Security Advisory
  • Security Update

Cisco Webex Flaw Allows HTTP Response Tampering

FHN May 22, 2025
Cisco has patched a security flaw (CVE-2025-20255) in its Webex Meetings service that could let attackers manipulate...
Read More Read more about Cisco Webex Flaw Allows HTTP Response Tampering
PowerDNS Vulnerability Enables DoS via TCP Connection screenshot2
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

PowerDNS Vulnerability Enables DoS via TCP Connection

FHN May 21, 2025
PowerDNS has released an important security update to fix a high-risk vulnerability in DNSdist, its DNS proxy...
Read More Read more about PowerDNS Vulnerability Enables DoS via TCP Connection
Enhanced Admin Security for Windows 11 mundissima-windows-11-photo-shutterstock
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • windows

Enhanced Admin Security for Windows 11

FHN May 21, 2025
Microsoft is rolling out a major security upgrade in Windows 11 called Administrator Protection, aimed at stopping...
Read More Read more about Enhanced Admin Security for Windows 11
RVTools Exploited to Deliver Bumblebee Malware to Windows Users 1707839113137
  • malicious cyber actors
  • Exploitation
  • Malware
  • windows

RVTools Exploited to Deliver Bumblebee Malware to Windows Users

FHN May 20, 2025
On May 13, 2025, a sophisticated supply chain attack compromised the trusted VMware administration tool RVTools, turning...
Read More Read more about RVTools Exploited to Deliver Bumblebee Malware to Windows Users
AutoIT Scripts Exploited to Deploy Windows Malware images (1)
  • Exploitation
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • windows

AutoIT Scripts Exploited to Deploy Windows Malware

FHN May 20, 2025
Cybersecurity researchers have discovered a sophisticated malware campaign that leverages AutoIT, a scripting language known for its...
Read More Read more about AutoIT Scripts Exploited to Deploy Windows Malware
Auth0-PHP Vulnerability: Unauthorized Access Risk images
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Auth0-PHP Vulnerability: Unauthorized Access Risk

FHN May 20, 2025
A critical vulnerability has been found in the Auth0-PHP SDK that could let attackers bypass authentication by...
Read More Read more about Auth0-PHP Vulnerability: Unauthorized Access Risk
Cache Timing Bypasses Windows 11 KASLR, Reveals Kernel Base Network-Security
  • windows
  • Internet Security
  • Security Advisory
  • Security Update

Cache Timing Bypasses Windows 11 KASLR, Reveals Kernel Base

FHN May 19, 2025
Researchers have found a way to bypass Kernel Address Space Layout Randomization (KASLR) on fully updated Windows...
Read More Read more about Cache Timing Bypasses Windows 11 KASLR, Reveals Kernel Base
Zoom Phishing Steals Login Credentials Zoom-Meeting-Links-Being-Exploited-For-Malware-And-Phishing-Attacks
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

Zoom Phishing Steals Login Credentials

FHN May 19, 2025
A new phishing campaign is tricking users with fake Zoom meeting invites that appear to come from...
Read More Read more about Zoom Phishing Steals Login Credentials
Xerox FreeFlow Print Server v2: April 2025 Security Patch common-security-vulnerabilities-1000x503
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • windows

Xerox FreeFlow Print Server v2: April 2025 Security Patch

FHN May 15, 2025
Xerox has rolled out its April 2025 security update for the FreeFlow Print Server v2 (Windows 10),...
Read More Read more about Xerox FreeFlow Print Server v2: April 2025 Security Patch
Critical Adobe Illustrator Vulnerability (CVE-2025-30330) – Update Now Vulnerability-Management-in-Projekten
  • Security Update
  • Internet Security
  • Security Advisory
  • Tips
  • vulnerability

Critical Adobe Illustrator Vulnerability (CVE-2025-30330) – Update Now

FHN May 15, 2025
Adobe has released an urgent security update for Illustrator after discovering a critical vulnerability (CVE-2025-30330) that affects...
Read More Read more about Critical Adobe Illustrator Vulnerability (CVE-2025-30330) – Update Now
Critical Command Injection Flaw Found in F5 BIG-IP Systems (CVE-2025-31644) f5
  • Remote code execution
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Critical Command Injection Flaw Found in F5 BIG-IP Systems (CVE-2025-31644)

FHN May 13, 2025
A critical vulnerability, CVE-2025-31644, has been discovered in F5 BIG-IP systems running in Appliance mode. The flaw...
Read More Read more about Critical Command Injection Flaw Found in F5 BIG-IP Systems (CVE-2025-31644)
VMware Tools Vulnerability: File Modification & Malicious Ops VMware-Vulnerability
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • VMware

VMware Tools Vulnerability: File Modification & Malicious Ops

FHN May 13, 2025
A new macOS vulnerability, CVE-2025-31258, has been disclosed by security researcher wh1te4ever, along with a proof-of-concept (PoC)...
Read More Read more about VMware Tools Vulnerability: File Modification & Malicious Ops
VMware Patches Security Flaw in VMware Tools (CVE-2025-22247) vmware-logo-line
  • Security Update
  • Internet Security
  • Security Advisory
  • VMware
  • vulnerability

VMware Patches Security Flaw in VMware Tools (CVE-2025-22247)

FHN May 12, 2025
Broadcom-owned VMware has released security updates to fix a moderate-severity vulnerability (CVE-2025-22247) in VMware Tools, which has...
Read More Read more about VMware Patches Security Flaw in VMware Tools (CVE-2025-22247)
IPFire 2.29: Core Update 194 is Here! 8732b0f0-78ba-4157-ac1a-4d86a8282214
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

IPFire 2.29: Core Update 194 is Here!

FHN May 12, 2025
The IPFire team has officially released IPFire 2.29 – Core Update 194, bringing a host of security...
Read More Read more about IPFire 2.29: Core Update 194 is Here!
Phishing Bypasses Email Security with Blob URLs Email_security
  • phishing
  • Internet Security
  • malicious cyber actors

Phishing Bypasses Email Security with Blob URLs

FHN May 12, 2025
Cofense Intelligence researchers have uncovered a phishing method that uses Blob URIs to sneak fake login pages...
Read More Read more about Phishing Bypasses Email Security with Blob URLs
New Malware Hides in Bitmap Images of .NET Apps malware
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

New Malware Hides in Bitmap Images of .NET Apps

FHN May 9, 2025
Cybersecurity experts at Palo Alto Networks’ Unit 42 have discovered a new method attackers use to hide...
Read More Read more about New Malware Hides in Bitmap Images of .NET Apps
Cybercriminals Exploit IT Help Desks as Entry Point for Attacks iStock-1435605327
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Cybercriminals Exploit IT Help Desks as Entry Point for Attacks

FHN May 9, 2025
Cybercriminals are increasingly pretending to be IT staff or trusted authorities to trick employees into giving them...
Read More Read more about Cybercriminals Exploit IT Help Desks as Entry Point for Attacks
Cisco Patches Critical SISF Vulnerability Affecting Multiple Products Cisco-company-logo-1024x576
  • vulnerability
  • cisco
  • Internet Security
  • Security Advisory
  • Security Update

Cisco Patches Critical SISF Vulnerability Affecting Multiple Products

FHN May 8, 2025
Cisco has issued critical security updates to address a vulnerability in its Switch Integrated Security Features (SISF),...
Read More Read more about Cisco Patches Critical SISF Vulnerability Affecting Multiple Products
Agenda Ransomware Adds SmokeLoader & NETXLOADER 1676635898535
  • Tips
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update

Agenda Ransomware Adds SmokeLoader & NETXLOADER

FHN May 8, 2025
The Agenda ransomware group (Qilin) ramped up attacks in early 2025, hitting key sectors worldwide with tools...
Read More Read more about Agenda Ransomware Adds SmokeLoader & NETXLOADER
Wormable Linux Rootkit Steals SSH Keys, Escalates Privileges Root lInux
  • Tips

Wormable Linux Rootkit Steals SSH Keys, Escalates Privileges

FHN May 7, 2025
Researchers at ANY.RUN have discovered a complex attack using the Diamorphine rootkit to install a crypto miner...
Read More Read more about Wormable Linux Rootkit Steals SSH Keys, Escalates Privileges
Pahalgam Attack Lure Used in Cyberattacks Against Indian Government What-is-cyberattack
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

Pahalgam Attack Lure Used in Cyberattacks Against Indian Government

FHN May 5, 2025
In a targeted cyber espionage campaign, attackers are using fake documents referencing the recent Pahalgam attack to...
Read More Read more about Pahalgam Attack Lure Used in Cyberattacks Against Indian Government
Hackers Exploit 21 Apps to Take Full Control of E-Commerce Servers IoT-influences-Cybersecurity
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Hackers Exploit 21 Apps to Take Full Control of E-Commerce Servers

FHN May 5, 2025
Cybersecurity firm Sansec has exposed a sophisticated supply chain attack that compromised 21 popular e-commerce applications, giving...
Read More Read more about Hackers Exploit 21 Apps to Take Full Control of E-Commerce Servers
Critical Apache ActiveMQ Vulnerability Allows Remote Code Execution download
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Critical Apache ActiveMQ Vulnerability Allows Remote Code Execution

FHN May 2, 2025
A serious security flaw has been discovered in Apache ActiveMQ’s .NET Message Service (NMS) library. This vulnerability,...
Read More Read more about Critical Apache ActiveMQ Vulnerability Allows Remote Code Execution
Quantum Computing’s Cybersecurity Impact: Key Considerations for CISOs shutterstock_1277557675
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Quantum Computing’s Cybersecurity Impact: Key Considerations for CISOs

FHN May 2, 2025
Quantum computing is moving from theory to reality—and with it comes a serious challenge for today’s encryption...
Read More Read more about Quantum Computing’s Cybersecurity Impact: Key Considerations for CISOs
Tesla Model 3 VCSEC Flaw Allows Arbitrary Code Execution media_10996a6fb5f21f89e5b56f4a9cd8050ef50dd6433
  • Internet Security
  • Security Advisory
  • Security Update

Tesla Model 3 VCSEC Flaw Allows Arbitrary Code Execution

FHN May 2, 2025
A serious security flaw in Tesla’s Model 3 was revealed during the 2025 Pwn2Own hacking competition. The...
Read More Read more about Tesla Model 3 VCSEC Flaw Allows Arbitrary Code Execution
Commvault Discloses Azure Cloud Breach After Zero-Day Exploit Screenshot 2025-05-01 133629
  • Exploitation
  • Compromised
  • Internet Security
  • Security Advisory
  • Security Update
  • Zero Day Attack

Commvault Discloses Azure Cloud Breach After Zero-Day Exploit

FHN May 1, 2025
Commvault, a global company known for data protection and information management, has confirmed a cyberattack on its...
Read More Read more about Commvault Discloses Azure Cloud Breach After Zero-Day Exploit
Netgear EX6200 Bug Allows Remote Data Theft EX6200-100UKS_3_supersize
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update

Netgear EX6200 Bug Allows Remote Data Theft

FHN May 1, 2025
Security researchers have found three serious flaws in the Netgear EX6200 Wi-Fi extender that let hackers access...
Read More Read more about Netgear EX6200 Bug Allows Remote Data Theft
CISO to CEO: A Reporting Structure Argument Reporting-information-security
  • Internet Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

CISO to CEO: A Reporting Structure Argument

FHN April 30, 2025
In today’s cyber threat landscape, who the Chief Information Security Officer (CISO) reports to is more than...
Read More Read more about CISO to CEO: A Reporting Structure Argument
Nitrogen Ransomware: Cobalt Strike & Log Wipe in Attacks Programming and password concept
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update

Nitrogen Ransomware: Cobalt Strike & Log Wipe in Attacks

FHN April 30, 2025
Cybercriminals have used the Nitrogen ransomware campaign to target victims through fake online ads. Nitrogen Ransomware They...
Read More Read more about Nitrogen Ransomware: Cobalt Strike & Log Wipe in Attacks
Chrome Sandbox Security Flaw: Technical Analysis google-crome
  • google
  • Internet Security
  • Security Advisory
  • Security Update

Chrome Sandbox Security Flaw: Technical Analysis

FHN April 29, 2025
A serious security flaw, CVE-2025-2783, has been found in Google Chrome, affecting the Mojo inter-process communication (IPC)...
Read More Read more about Chrome Sandbox Security Flaw: Technical Analysis
Magento Carding Attack Leverages Fake GIFs and Proxy Malware emotet-banking-malware
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Magento Carding Attack Leverages Fake GIFs and Proxy Malware

FHN April 28, 2025
A multi-stage carding attack targeted a Magento eCommerce site running outdated version 1.9.2.4, unsupported since June 2020....
Read More Read more about Magento Carding Attack Leverages Fake GIFs and Proxy Malware
Defender XDR False Positive Leaked 1700+ Docs microsoft-defender-now-available-for-individuals--families-2022-06-17
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update

Defender XDR False Positive Leaked 1700+ Docs

FHN April 25, 2025
A significant data leak involving Microsoft Defender XDR exposed over 1,700 sensitive documents from many organizations, triggered...
Read More Read more about Defender XDR False Positive Leaked 1700+ Docs
Chrome UAF Vulnerabilities: Active Exploits chromevulnerability
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Chrome UAF Vulnerabilities: Active Exploits

FHN April 25, 2025
Researchers discovered two critical UAF vulnerabilities in Chrome, actively exploited in the wild, but Google’s MiraclePtr defense...
Read More Read more about Chrome UAF Vulnerabilities: Active Exploits
Ivanti 0-Day Exploited for DslogdRAT & Web Shell 1697728441447
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Ivanti 0-Day Exploited for DslogdRAT & Web Shell

FHN April 24, 2025
Threat actors have exploited a zero-day flaw in Ivanti Connect Secure (CVE-2025-0282) to install a web shell...
Read More Read more about Ivanti 0-Day Exploited for DslogdRAT & Web Shell
Commvault RCE Exploited, PoC Available Screenshot 2025-04-24 114931
  • Exploitation
  • BOTNET
  • Compromised
  • Internet Security
  • Security Advisory
  • Security Update

Commvault RCE Exploited, PoC Available

FHN April 24, 2025
A major remote code execution (RCE) vulnerability, CVE-2025-34028, has been discovered in Commvault’s on-premise backup and recovery...
Read More Read more about Commvault RCE Exploited, PoC Available
NFC Exploited to Steal Funds from ATMs and POS AdobeStock_155741106
  • Exploitation
  • BOTNET
  • Internet Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

NFC Exploited to Steal Funds from ATMs and POS

FHN April 23, 2025
NFC Technology Abused in Global ATM and POS Fraud Cybercriminals, mainly from Chinese underground networks, are using...
Read More Read more about NFC Exploited to Steal Funds from ATMs and POS
TP-Link Router Vulnerabilities Enable Malicious SQL Execution IoT-influences-Cybersecurity
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

TP-Link Router Vulnerabilities Enable Malicious SQL Execution

FHN April 23, 2025
Cybersecurity researchers have found critical SQL injection vulnerabilities in four TP-Link router models, which could allow attackers...
Read More Read more about TP-Link Router Vulnerabilities Enable Malicious SQL Execution
Impersonated Dev Tools on npm/PyPI Used for Credential Theft
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips

Impersonated Dev Tools on npm/PyPI Used for Credential Theft

FHN April 23, 2025
The Socket Threat Research Team has discovered three malicious open-source packages—two on PyPI and one on npm—designed...
Read More Read more about Impersonated Dev Tools on npm/PyPI Used for Credential Theft
Hackers Leverage Cloudflare for RAT Deployment chinese-hackers-deploy-stealthy-fileless-vshell-rat-showcase_image-4-a-28012
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers Leverage Cloudflare for RAT Deployment

FHN April 22, 2025
Hackers have been using Cloudflare tunnels since February 2024 to host malware and spread remote access trojans...
Read More Read more about Hackers Leverage Cloudflare for RAT Deployment
Infostealer Malware Surges 84% in Phishing Emails, IBM Warns iStock-1420039900
  • malicious cyber actors
  • Internet Security
  • Malware
  • phishing
  • Security Advisory
  • Security Update

Infostealer Malware Surges 84% in Phishing Emails, IBM Warns

FHN April 21, 2025
A recent report from IBM X-Force reveals that infostealer malware delivered through phishing emails has spiked by...
Read More Read more about Infostealer Malware Surges 84% in Phishing Emails, IBM Warns
KeyPlug Server Leak Reveals Fortinet Exploits multiple-vulnerabilities-post
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips

KeyPlug Server Leak Reveals Fortinet Exploits

FHN April 18, 2025
Cybersecurity researchers recently uncovered a server linked to the KeyPlug malware, used by the threat group RedGolf...
Read More Read more about KeyPlug Server Leak Reveals Fortinet Exploits
AnythingLLM Systems at Risk: Critical Remote Code Execution Vulnerability Discovered ICS-vulnerabilities-cybersecurity-feature-May-9-2022-web
  • vulnerability
  • Internet Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

AnythingLLM Systems at Risk: Critical Remote Code Execution Vulnerability Discovered

FHN April 18, 2025
A major security flaw (CVE-2024-13059) was found in the open-source AI tool AnythingLLM. Discovered in February 2025,...
Read More Read more about AnythingLLM Systems at Risk: Critical Remote Code Execution Vulnerability Discovered
Server-Side Phishing Targets Portals for Logins 360_F_1224936513_tHR4mAT8clsPQhwXdxfBA84SnsbfCukC
  • phishing
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Server-Side Phishing Targets Portals for Logins

FHN April 17, 2025
Attackers are now using server-side phishing to target employee and member login portals, making it harder to...
Read More Read more about Server-Side Phishing Targets Portals for Logins
Two Apple Zero-Days Under Active iOS Attack applepatch_Alberto_Garcia_Guillen_shutterstock
  • Tips
  • Apple
  • Internet Security
  • Mobile Security
  • Regulation
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Two Apple Zero-Days Under Active iOS Attack

FHN April 17, 2025
Apple has released iOS 18.4.1 and iPadOS 18.4.1 to fix two zero-day vulnerabilities that were actively exploited...
Read More Read more about Two Apple Zero-Days Under Active iOS Attack
Critical Chrome Flaw Allowed Data Theft & Unauthorized Access news-about-google-chrome-zero-day-vulnerability_en
  • google
  • Internet Security
  • Security Advisory
  • Security Update

Critical Chrome Flaw Allowed Data Theft & Unauthorized Access

FHN April 16, 2025
Google has released an urgent security update for its Chrome browser after two critical vulnerabilities were found,...
Read More Read more about Critical Chrome Flaw Allowed Data Theft & Unauthorized Access
Key Security Awareness Metrics for CISOs cyber security banner
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Key Security Awareness Metrics for CISOs

FHN April 16, 2025
As companies shift to zero-trust security models, security awareness has become a key line of defense. CISOs...
Read More Read more about Key Security Awareness Metrics for CISOs
Microsoft Teams File Sharing Down Due to Outage teams-article-cover
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Microsoft Teams File Sharing Down Due to Outage

FHN April 16, 2025
Many Microsoft Teams users around the world are currently facing issues with file sharing due to an...
Read More Read more about Microsoft Teams File Sharing Down Due to Outage
VMware ESXi 8.0 Update 3e Now Available for Free 1566735848846
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

VMware ESXi 8.0 Update 3e Now Available for Free

FHN April 15, 2025
VMware has announced the release of ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor....
Read More Read more about VMware ESXi 8.0 Update 3e Now Available for Free
Smishing Attack Targets Toll Road U Users Smishing Attack
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update

Smishing Attack Targets Toll Road U Users

FHN April 15, 2025
Cisco Talos researchers have found a major smishing campaign targeting U.S. toll road users. Active since October...
Read More Read more about Smishing Attack Targets Toll Road U Users
BPFDoor Malware Leverages Reverse Shell for Network Control Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

BPFDoor Malware Leverages Reverse Shell for Network Control

FHN April 14, 2025
A new wave of cyber espionage has highlighted BPFDoor, a stealthy malware used to secretly access and...
Read More Read more about BPFDoor Malware Leverages Reverse Shell for Network Control
Stealthy ResolverRAT Employs Advanced In-Memory Execution In-Memory-Attacks
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Stealthy ResolverRAT Employs Advanced In-Memory Execution

FHN April 14, 2025
A new remote access trojan (RAT) called ResolverRAT is posing a serious threat to businesses around the...
Read More Read more about Stealthy ResolverRAT Employs Advanced In-Memory Execution
Microsoft Adds Antimalware Scan to Exchange & SharePoint Security 1733479711930
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update

Microsoft Adds Antimalware Scan to Exchange & SharePoint Security

FHN April 11, 2025
Microsoft has added a major security upgrade to Exchange Server and SharePoint Server by integrating them with...
Read More Read more about Microsoft Adds Antimalware Scan to Exchange & SharePoint Security
Critical Dell PowerScale Vulnerabilities Allow Account Takeover 1605044769_dell_bug_story
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Critical Dell PowerScale Vulnerabilities Allow Account Takeover

FHN April 10, 2025
Dell Technologies has released a critical alert about serious flaws in PowerScale OneFS that could let attackers...
Read More Read more about Critical Dell PowerScale Vulnerabilities Allow Account Takeover
ViperSoftX Malware Hidden in Cracked Software Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

ViperSoftX Malware Hidden in Cracked Software

FHN April 10, 2025
AhnLab Security Intelligence Center (ASEC) discovered a cyber attack targeting Korean users with ViperSoftX malware. ViperSoftX Malware...
Read More Read more about ViperSoftX Malware Hidden in Cracked Software
New Email Attack Hits Office 365 Users and Delivers Malware GettyImages-1135152518_MW
  • phishing
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

New Email Attack Hits Office 365 Users and Delivers Malware

FHN April 9, 2025
Cybersecurity experts have found a new phishing attack that steals Office 365 credentials and installs malware, putting...
Read More Read more about New Email Attack Hits Office 365 Users and Delivers Malware
Windows Active Directory Flaw Leads to Unauthorized Privilege Escalation Windows-Alert-2
  • windows
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Windows Active Directory Flaw Leads to Unauthorized Privilege Escalation

FHN April 9, 2025
Microsoft has released an urgent patch for a serious security flaw—CVE-2025-29810—affecting Windows Active Directory Domain Services (AD...
Read More Read more about Windows Active Directory Flaw Leads to Unauthorized Privilege Escalation
Ivanti RCE flaw affects over 5,000 devices 1736392951985
  • RCE Flaw
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Ivanti RCE flaw affects over 5,000 devices

FHN April 8, 2025
More than 5,000 Ivanti Connect Secure devices remain exposed to a high-risk remote code execution (RCE) vulnerability,...
Read More Read more about Ivanti RCE flaw affects over 5,000 devices
CISA Warns of Active CrushFTP Authentication Bypass Exploit Adobe-ColdFusion-775x436
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

CISA Warns of Active CrushFTP Authentication Bypass Exploit

FHN April 8, 2025
CISA has issued a warning about a critical vulnerability (CVE-2025-31161) in CrushFTP that is being actively exploited....
Read More Read more about CISA Warns of Active CrushFTP Authentication Bypass Exploit
Lazarus Hides Malicious npm Code Using Hex Encoding npm-alternatives
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Lazarus Hides Malicious npm Code Using Hex Encoding

FHN April 7, 2025
North Korea’s Lazarus Group has ramped up its Contagious Interview campaign by using new npm packages with...
Read More Read more about Lazarus Hides Malicious npm Code Using Hex Encoding
NEPTUNE RAT: Windows Malware Steals Passwords from Over 270 Apps romcom2-1200x630px-social
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

NEPTUNE RAT: Windows Malware Steals Passwords from Over 270 Apps

FHN April 7, 2025
A new cyber threat called Neptune RAT is raising concerns among Windows users, as it targets sensitive...
Read More Read more about NEPTUNE RAT: Windows Malware Steals Passwords from Over 270 Apps
New spyware tricks Android users for passwords android-password-manager-hacked
  • Android malware
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips

New spyware tricks Android users for passwords

FHN April 4, 2025
A new Android spyware app uses a password prompt to prevent uninstallation, making it difficult for users...
Read More Read more about New spyware tricks Android users for passwords
Oracle Confirms Data Breach, Begins Notifying Clients 1691062404670
  • Data Breach
  • Internet Security
  • Security Advisory
  • Security Update

Oracle Confirms Data Breach, Begins Notifying Clients

FHN April 4, 2025
Oracle confirmed a data breach affecting its older Gen 1 servers, its second incident in weeks, highlighting...
Read More Read more about Oracle Confirms Data Breach, Begins Notifying Clients
Qilin Ransomware Attack: Fake ScreenConnect Login for Admin Access ransomware_v2
  • Ransomware
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • Tips

Qilin Ransomware Attack: Fake ScreenConnect Login for Admin Access

FHN April 4, 2025
A ransomware attack targeted MSPs via phishing emails, deploying Qilin ransomware across customer environments. Ransomware Attack Targets...
Read More Read more about Qilin Ransomware Attack: Fake ScreenConnect Login for Admin Access
Trinda Malware: Android Attack Replaces Call Numbers mobile_malware_pr
  • Malware
  • Android malware
  • Internet Security
  • Security Advisory
  • Security Update

Trinda Malware: Android Attack Replaces Call Numbers

FHN April 4, 2025
Kaspersky Lab has discovered a new version of the Triada Trojan targeting Android devices. This variant is...
Read More Read more about Trinda Malware: Android Attack Replaces Call Numbers
Cisco AnyConnect VPN Server Vulnerable to DoS Exploits Cisco AnyConnect VPN
  • cisco
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Cisco AnyConnect VPN Server Vulnerable to DoS Exploits

FHN April 3, 2025
Cisco has revealed a critical flaw (CVE-2025-20212) in its AnyConnect VPN Server for Meraki MX and Z...
Read More Read more about Cisco AnyConnect VPN Server Vulnerable to DoS Exploits
Phishing Campaign Aims to Steal Investor Login Details DIGI_21_Blog_Password Phishing_BlogPromo_660x371
  • phishing
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Phishing Campaign Aims to Steal Investor Login Details

FHN April 3, 2025
Symantec has discovered a sophisticated phishing campaign targeting Monex Securities (マネックス証券), a leading online securities firm in...
Read More Read more about Phishing Campaign Aims to Steal Investor Login Details
X (Twitter) Data Breach: 400GB Leak Exposes 2.8 Billion Records IoT-influences-Cybersecurity
  • BOTNET
  • Compromised
  • Data Breach
  • Exploitation
  • Security Advisory
  • Security Update

X (Twitter) Data Breach: 400GB Leak Exposes 2.8 Billion Records

FHN April 2, 2025
A massive 400GB dataset with info from 2.87 billion X (formerly Twitter) users has appeared on hacker...
Read More Read more about X (Twitter) Data Breach: 400GB Leak Exposes 2.8 Billion Records
IRS-themed attacks are on the rise, targeting taxpayers’ mobile devices rise-in-irs-themed-texting-scams-1200x675
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

IRS-themed attacks are on the rise, targeting taxpayers’ mobile devices

FHN April 2, 2025
With the U.S. tax deadline nearing, scammers are ramping up IRS-themed attacks. McAfee Labs reports a rise...
Read More Read more about IRS-themed attacks are on the rise, targeting taxpayers’ mobile devices
Critical HP Vulnerability Allows Remote Code Execution and Authentication Bypass sddefault
  • Tips
  • Security Advisory
  • Security Update
  • vulnerability

Critical HP Vulnerability Allows Remote Code Execution and Authentication Bypass

FHN April 1, 2025
A newly disclosed flaw in HPE’s Insight CMU v8.2, CVE-2024-13804, allows attackers to bypass authentication and execute...
Read More Read more about Critical HP Vulnerability Allows Remote Code Execution and Authentication Bypass
Earth Alux Hackers Deploy VARGIET Malware to Attack Organizations malware
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Earth Alux Hackers Deploy VARGIET Malware to Attack Organizations

FHN April 1, 2025
Recent cyberattacks by the APT group Earth Alux have exposed the use of advanced malware, including the...
Read More Read more about Earth Alux Hackers Deploy VARGIET Malware to Attack Organizations
BlackSuit Ransomware: Fake Zoom Installer Warning blackSuit-blog
  • Ransomware
  • Internet Security
  • Security Advisory
  • Security Update

BlackSuit Ransomware: Fake Zoom Installer Warning

FHN March 31, 2025
Cybersecurity analysts have identified a campaign using a fake Zoom installer to spread BlackSuit ransomware on Windows...
Read More Read more about BlackSuit Ransomware: Fake Zoom Installer Warning
Microsoft tool fixes Windows boot issues Logo-Windows
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update

Microsoft tool fixes Windows boot issues

FHN March 31, 2025
Microsoft Introduces “Quick Machine Recovery” to Simplify Boot Issue Fixes Microsoft has introduced Quick Machine Recovery, a...
Read More Read more about Microsoft tool fixes Windows boot issues
Mozilla Patches Windows Vulnerability Following Chrome Zero-Day fx_colorcalibration_blogheader_1280x720-1
  • vulnerability
  • Security Advisory
  • Security Update
  • windows
  • Zero Day Attack

Mozilla Patches Windows Vulnerability Following Chrome Zero-Day

FHN March 28, 2025
Mozilla has released an urgent update for Firefox on Windows to fix a critical vulnerability. This follows...
Read More Read more about Mozilla Patches Windows Vulnerability Following Chrome Zero-Day
Tor Browser 14.0.8: Urgent Windows Release tor-the-onion-router-1
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Tor Browser 14.0.8: Urgent Windows Release

FHN March 28, 2025
The Tor Project has quickly released an emergency update, Tor Browser 14.0.8, available only for Windows users....
Read More Read more about Tor Browser 14.0.8: Urgent Windows Release
Detecting Deep Learning Backdoors: The DeBackdoor Approach Machine-Learning-3
  • Backdoor
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Detecting Deep Learning Backdoors: The DeBackdoor Approach

FHN March 28, 2025
Researchers from Qatar Computing Research Institute and Mohamed bin Zayed University developed DeBackdoor, a framework to detect...
Read More Read more about Detecting Deep Learning Backdoors: The DeBackdoor Approach
SHELBY malware: GitHub C2, data theft shutterstock_2392299743-scaled
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips

SHELBY malware: GitHub C2, data theft

FHN March 28, 2025
Elastic Security Labs has discovered a complex malware campaign, REF8685, targeting Iraq’s telecom sector. The campaign uses...
Read More Read more about SHELBY malware: GitHub C2, data theft
Fake Snow White downloads spread malware to viewers 628251279_1647189474_image-1280x720-2025-03-11t160433-compressed_202503
  • Tips
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Fake Snow White downloads spread malware to viewers

FHN March 28, 2025
With no official streaming release for the new Snow White, many users are resorting to piracy, making...
Read More Read more about Fake Snow White downloads spread malware to viewers
46 flaws: solar inverters open to attack SUN_Blog_Inverter_Basics
  • Exploitation
  • Compromised
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

46 flaws: solar inverters open to attack

FHN March 28, 2025
Forescout Vedere Labs found 46 vulnerabilities in solar inverters from Sungrow, Growatt, and SMA. Exploiting these flaws...
Read More Read more about 46 flaws: solar inverters open to attack
Cloudflare: password error, outage cf-logo-v-cmyk-rev
  • Internet Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

Cloudflare: password error, outage

FHN March 26, 2025
Cloudflare’s 1-hour outage, affecting services like R2 storage and Cache Reserve, was caused by a faulty credential...
Read More Read more about Cloudflare: password error, outage
CrushFTP warns: unauthorized access via HTTP(S) CrushFTP-warns-users-to-patch-exploited-zero-day-immediately
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

CrushFTP warns: unauthorized access via HTTP(S)

FHN March 26, 2025
CrushFTP and Next.js face critical vulnerabilities, raising security concerns. Rapid7 warns these flaws could lead to data...
Read More Read more about CrushFTP warns: unauthorized access via HTTP(S)
Malicious AI tools up 200%, ChatGPT jailbreaks +52% chatgpt-jailbreak-1024x523
  • Tips
  • Compromised
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Malicious AI tools up 200%, ChatGPT jailbreaks +52%

FHN March 26, 2025
In 2024, AI-related threats grew as cybercriminals increasingly targeted large language models (LLMs). KELA’s “State of Cybercrime”...
Read More Read more about Malicious AI tools up 200%, ChatGPT jailbreaks +52%
Banking malware hits 248,000 mobile users via social engineering emotet-banking-malware
  • Malware
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Banking malware hits 248,000 mobile users via social engineering

FHN March 25, 2025
In 2024, mobile banking malware affected nearly 248,000 users, a 3.6x jump from 69,000 the previous year....
Read More Read more about Banking malware hits 248,000 mobile users via social engineering
WordPress plugin vulnerability exposes websites to SQL injection attack-header
  • wordpress
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

WordPress plugin vulnerability exposes websites to SQL injection

FHN March 24, 2025
A critical vulnerability in the popular WordPress plugin GamiPress, identified as CVE-2024-13496, allows unauthenticated SQL injection attacks...
Read More Read more about WordPress plugin vulnerability exposes websites to SQL injection
Chinese ‘Web Shell Whisperer’ exploits shells and tunnels for stealthy access lukko
  • Internet Security
  • Exploitation
  • Security Advisory
  • Security Update
  • Tips

Chinese ‘Web Shell Whisperer’ exploits shells and tunnels for stealthy access

FHN March 24, 2025
Sygnia uncovered a cyber espionage operation by a China-linked group, “Weaver Ant.” The group targeted a major...
Read More Read more about Chinese ‘Web Shell Whisperer’ exploits shells and tunnels for stealthy access
A recent update’s code error caused the Outlook Web outage, Microsoft reports hq720
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

A recent update’s code error caused the Outlook Web outage, Microsoft reports

FHN March 21, 2025
Microsoft experienced a major outage on March 19, 2025, affecting Outlook on the web. The issue was...
Read More Read more about A recent update’s code error caused the Outlook Web outage, Microsoft reports
Dragon RaaS leads crimeware with new attack tactics pngtree-a-striking-golden-dragon-stands-out-vividly-on-solid-png-image_17414181
  • BOTNET
  • Exploitation
  • malicious cyber actors
  • Ransomware
  • Security Advisory
  • Security Update

Dragon RaaS leads crimeware with new attack tactics

FHN March 21, 2025
Dragon RaaS, a ransomware group blending hacktivism and cybercrime, has become a key player in the “Five...
Read More Read more about Dragon RaaS leads crimeware with new attack tactics
Zero-Hour Phishing Attacks Increase by 130% cyber-threat
  • Zero Day Attack
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update
  • vulnerability

Zero-Hour Phishing Attacks Increase by 130%

FHN March 20, 2025
Menlo Security’s annual Browser Security Report reveals a 130% increase in zero-hour phishing attacks and growing use...
Read More Read more about Zero-Hour Phishing Attacks Increase by 130%
New malware uses JPEG files to hide and spread infostealers understanding_infostealers_blog_cover-1
  • BOTNET
  • Compromised
  • Exploitation
  • infostealer
  • Malware
  • Security Advisory
  • Security Update

New malware uses JPEG files to hide and spread infostealers

FHN March 20, 2025
A new cyber threat hides malware in JPEG images to steal credentials. Users download seemingly harmless images,...
Read More Read more about New malware uses JPEG files to hide and spread infostealers
Threat Actors Steal 3.2 Billion Credentials, Infect 23 Million Devices CredentialTheftBlog
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Threat Actors Steal 3.2 Billion Credentials, Infect 23 Million Devices

FHN March 19, 2025
Flashpoint’s 2024 report reveals a sharp rise in cyber threats, with 3.2 billion stolen credentials — a...
Read More Read more about Threat Actors Steal 3.2 Billion Credentials, Infect 23 Million Devices
VPN Vulnerabilities Emerge as Key Target for Cyber Attacks on Organizations 1680166004265
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

VPN Vulnerabilities Emerge as Key Target for Cyber Attacks on Organizations

FHN March 19, 2025
VPN vulnerabilities have become a major threat to organizations worldwide. Cybercriminals and state-sponsored hackers are increasingly exploiting...
Read More Read more about VPN Vulnerabilities Emerge as Key Target for Cyber Attacks on Organizations
Warning: Malware Found in Free Word-to-PDF Converters zU8gpvFte2AdkMPrdadx2a-1200-80
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips

Warning: Malware Found in Free Word-to-PDF Converters

FHN March 18, 2025
The FBI warns that free file conversion tools are being used to spread malware. The FBI’s Denver...
Read More Read more about Warning: Malware Found in Free Word-to-PDF Converters
Millions of RSA keys exposed: major flaws 1_JuHdySWIq3FYOcscRvUbnA
  • vulnerability
  • Exploitation
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

Millions of RSA keys exposed: major flaws

FHN March 17, 2025
A recent study revealed a major vulnerability in RSA keys, especially in IoT devices. Researchers found that...
Read More Read more about Millions of RSA keys exposed: major flaws
Wazuh SIEM vulnerability enables remote code execution 1660201445585
  • vulnerability
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update
  • Tips

Wazuh SIEM vulnerability enables remote code execution

FHN March 17, 2025
A critical vulnerability, CVE-2025-24016, has been found in the Wazuh SIEM platform, affecting versions 4.4.0 to 4.9.0....
Read More Read more about Wazuh SIEM vulnerability enables remote code execution
RansomHub via SocGholish, compromised sites img-blog-how-does-ransomware-spread-on-a-network
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update

RansomHub via SocGholish, compromised sites

FHN March 17, 2025
Threat actors behind SocGholish are now using hacked websites to spread RansomHub ransomware. The attack starts with...
Read More Read more about RansomHub via SocGholish, compromised sites
SSRF Vulnerabilities Targeted by 400+ IPs in Coordinated Attack common-security-vulnerabilities-1000x503
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

SSRF Vulnerabilities Targeted by 400+ IPs in Coordinated Attack

FHN March 14, 2025
GreyNoise has reported a coordinated wave of attacks exploiting Server-Side Request Forgery (SSRF) vulnerabilities across various platforms....
Read More Read more about SSRF Vulnerabilities Targeted by 400+ IPs in Coordinated Attack
Juniper Junos OS Vulnerability Exploited, CISA Warns New-Juniper-Junos-OS-Flaws-Expose-Devices-to-Remote-Attacks--Patch-Now
  • Exploitation
  • BOTNET
  • Compromised
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Juniper Junos OS Vulnerability Exploited, CISA Warns

FHN March 14, 2025
CISA has warned about a Junos OS vulnerability (CVE-2025-21590) in Juniper Networks. This flaw allows high-privileged local...
Read More Read more about Juniper Junos OS Vulnerability Exploited, CISA Warns
DCRat Malware Uses YouTube for Credential Theft dirty-deeds-done-dirt-heap-dcrat-li-facebook-1200x630
  • Malware
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

DCRat Malware Uses YouTube for Credential Theft

FHN March 13, 2025
In 2025, a new wave of DCRat backdoor attacks has emerged, using the Malware-as-a-Service (MaaS) model. Cybercriminals...
Read More Read more about DCRat Malware Uses YouTube for Credential Theft
PHP XXE Vulnerability Exposes Config Files and Private Keys IoT-influences-Cybersecurity
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update

PHP XXE Vulnerability Exposes Config Files and Private Keys

FHN March 12, 2025
A newly discovered XML External Entity (XXE) injection vulnerability in PHP allows attackers to bypass security measures...
Read More Read more about PHP XXE Vulnerability Exposes Config Files and Private Keys
CISA Warns of Windows Win32 Kernel Vulnerability 750x421_8dc370277e0cba6fd73820d7336026c7
  • vulnerability
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • windows

CISA Warns of Windows Win32 Kernel Vulnerability

FHN March 12, 2025
CISA has warned about a critical Windows Win32 kernel vulnerability, identified as CVE-2025-24983. This use-after-free flaw in...
Read More Read more about CISA Warns of Windows Win32 Kernel Vulnerability
Android Zygote Flaw Enables Code Execution and Privilege Escalation 1520181066098
  • Android malware
  • Compromised
  • Exploitation
  • Internet Security
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Android Zygote Flaw Enables Code Execution and Privilege Escalation

FHN March 11, 2025
A major vulnerability, CVE-2024-31317, has been discovered in Android, allowing attackers to exploit the Zygote process for...
Read More Read more about Android Zygote Flaw Enables Code Execution and Privilege Escalation
New Rust Code in Linux Kernel Addresses Memory Bugs 6-Year-Lifecycle-linux-kernel-lts-cycle
  • Linux Malware
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips

New Rust Code in Linux Kernel Addresses Memory Bugs

FHN March 11, 2025
Rust in the Linux kernel enhances memory safety, a key focus in development. Launched in 2021 by...
Read More Read more about New Rust Code in Linux Kernel Addresses Memory Bugs
iOS 18.4 Beta 3: New Features maxresdefault
  • Apple
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

iOS 18.4 Beta 3: New Features

FHN March 10, 2025
Apple released iOS 18.4 Beta 3 on March 10, 2025, for developers (build number 22E5222f). While no...
Read More Read more about iOS 18.4 Beta 3: New Features
Critical Flaw in Microsoft’s Time Travel Debugging Tool Hides Attacker Activity Cybersecurity and data privacy protection concept, lock, binary digits background
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Critical Flaw in Microsoft’s Time Travel Debugging Tool Hides Attacker Activity

FHN March 10, 2025
Microsoft’s Time Travel Debugging (TTD) tool, used to record and replay Windows programs, has critical bugs in...
Read More Read more about Critical Flaw in Microsoft’s Time Travel Debugging Tool Hides Attacker Activity
Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud 360_F_823644553_2RClv1DaJc9ZBI5UueIogprPANwFi9cP
  • Microsoft
  • cloud
  • Internet Security
  • Security Advisory
  • Security Update
  • Targeted Attacks

Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud

FHN March 6, 2025
Microsoft says Silk Typhoon is now targeting remote management tools and cloud apps for access, showing a...
Read More Read more about Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud
LummaStealer Threat Hidden in Fake CAPTCHAs: Silent Installation Alert Picture5
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • Tips

LummaStealer Threat Hidden in Fake CAPTCHAs: Silent Installation Alert

FHN March 6, 2025
Cybersecurity researchers at G DATA have discovered a new malware campaign using fake booking websites to spread...
Read More Read more about LummaStealer Threat Hidden in Fake CAPTCHAs: Silent Installation Alert
Cisco Webex for BroadWorks Flaw Could Expose User Credentials cisco (1)
  • cisco
  • BOTNET
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Cisco Webex for BroadWorks Flaw Could Expose User Credentials

FHN March 5, 2025
Cisco has disclosed a vulnerability in Webex for BroadWorks that could let attackers intercept user credentials and...
Read More Read more about Cisco Webex for BroadWorks Flaw Could Expose User Credentials
10,000+ WordPress sites exposed by donation plugin vulnerability wordpress
  • vulnerability
  • Internet Security
  • Malware
  • Remote code execution
  • Security Advisory
  • Security Update
  • wordpress

10,000+ WordPress sites exposed by donation plugin vulnerability

FHN March 5, 2025
A serious flaw in the popular GiveWP Donation Plugin has put over 10,000 WordPress sites at risk...
Read More Read more about 10,000+ WordPress sites exposed by donation plugin vulnerability
Google’s Email Shield hides your real email from apps Gmail-Logo-Hero
  • google
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Google’s Email Shield hides your real email from apps

FHN March 3, 2025
Google is developing Shielded Email, a tool that creates disposable email aliases to protect users’ real Gmail...
Read More Read more about Google’s Email Shield hides your real email from apps
Android Phones Unlocked via Cellebrite Zero-Day Exploit android-trojan
  • Security Update
  • Android malware
  • Exploitation
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Zero Day Attack

Android Phones Unlocked via Cellebrite Zero-Day Exploit

FHN March 3, 2025
Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where authorities used a zero-day exploit chain...
Read More Read more about Android Phones Unlocked via Cellebrite Zero-Day Exploit
Chinese Hackers Exploit Check Point VPN Zero-Day zeroday
  • BOTNET
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Chinese Hackers Exploit Check Point VPN Zero-Day

FHN March 3, 2025
Chinese hackers exploited a patched Check Point VPN flaw (CVE-2024-24919) to target organizations in Europe, Africa, and...
Read More Read more about Chinese Hackers Exploit Check Point VPN Zero-Day
Hackers Can Break Into Car Cameras in Minutes by Exploiting Security Flaws istockphoto-1914489902-612x612
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Hackers Can Break Into Car Cameras in Minutes by Exploiting Security Flaws

FHN March 3, 2025
At Black Hat Asia 2025, experts will reveal a major flaw in modern dashcams, showing how hackers...
Read More Read more about Hackers Can Break Into Car Cameras in Minutes by Exploiting Security Flaws
Pass-the-Cookie attacks bypass MFA, granting full account access cookies-supercookies
  • Security Update
  • Internet Security
  • Microsoft
  • Security Advisory
  • Tips

Pass-the-Cookie attacks bypass MFA, granting full account access

FHN February 28, 2025
Pass-the-Cookie attacks let hackers bypass MFA using stolen browser cookies, putting corporate accounts at risk across Office...
Read More Read more about Pass-the-Cookie attacks bypass MFA, granting full account access
Cisco Nexus Vulnerability Allows Malicious Command Injection CISA-Urges-Patching-of-Cisco-ASA-Flaw-Exploited-in-Ransomware-Attacks
  • cisco
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Cisco Nexus Vulnerability Allows Malicious Command Injection

FHN February 27, 2025
Cisco has released a critical advisory for a command injection vulnerability (CVE-2025-20161) affecting its Nexus 3000 and...
Read More Read more about Cisco Nexus Vulnerability Allows Malicious Command Injection
The SafetyCore app from Google scans photos on Android devices f49e3ffbd036414c87c20bbdb2c8f67f
  • google
  • Android malware
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

The SafetyCore app from Google scans photos on Android devices

FHN February 27, 2025
Recent reports show Google’s SafetyCore service, which scans content on devices, has been quietly installed on Android...
Read More Read more about The SafetyCore app from Google scans photos on Android devices
WordPress Plugin Flaw Exposes Millions to Script Injection images
  • Malware
  • Internet Security
  • Security Advisory
  • Security Update
  • wordpress

WordPress Plugin Flaw Exposes Millions to Script Injection

FHN February 26, 2025
A critical flaw in the Essential Addons for Elementor plugin, affecting over 2 million WordPress sites, exposes...
Read More Read more about WordPress Plugin Flaw Exposes Millions to Script Injection
GRUB2 Vulnerabilities Put Millions of Linux Devices at Risk Root lInux
  • Security Update
  • Exploitation
  • Internet Security
  • Linux Malware
  • Malware
  • Regulation
  • Security Advisory
  • Tips
  • vulnerability

GRUB2 Vulnerabilities Put Millions of Linux Devices at Risk

FHN February 26, 2025
GRUB2 vulnerabilities expose millions of Linux devices to secure boot bypass and remote code execution. Discovered during...
Read More Read more about GRUB2 Vulnerabilities Put Millions of Linux Devices at Risk
Updated TgToxic Malware Now Steals Login Credentials csm_0323_Aufmacher_Android_9174feaa7f
  • Security Update
  • Android malware
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Tips

Updated TgToxic Malware Now Steals Login Credentials

FHN February 26, 2025
The TgToxic Android malware, first found in July 2022, has been updated to better steal login credentials...
Read More Read more about Updated TgToxic Malware Now Steals Login Credentials
Linux Systems Under Attack: New Auto-Color Malware Grants Remote Access virus-linux
  • Linux Malware
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Linux Systems Under Attack: New Auto-Color Malware Grants Remote Access

FHN February 25, 2025
Palo Alto Networks researchers have discovered a new Linux malware, “Auto-Color,” which poses a serious threat due...
Read More Read more about Linux Systems Under Attack: New Auto-Color Malware Grants Remote Access
Google Warns of Phishing Attacks on Higher Education Institutions 1734721206538
  • google
  • Internet Security
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

Google Warns of Phishing Attacks on Higher Education Institutions

FHN February 25, 2025
Google and Mandiant warn of rising phishing attacks on U.S. higher education, exploiting academic schedules and institutional...
Read More Read more about Google Warns of Phishing Attacks on Higher Education Institutions
Sliver C2 Server Flaw Enables TCP Hijacking and Data Interception bug-virus-malware-freepik
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Sliver C2 Server Flaw Enables TCP Hijacking and Data Interception

FHN February 24, 2025
A critical flaw (CVE-2025-27090) in the Sliver C2 server allows attackers to hijack TCP connections using SSRF,...
Read More Read more about Sliver C2 Server Flaw Enables TCP Hijacking and Data Interception
Cybercriminals Deploy XLoader Malware Using Eclipse Jarsigner in ZIP Archives RAT Malware
  • BOTNET
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • Tips

Cybercriminals Deploy XLoader Malware Using Eclipse Jarsigner in ZIP Archives

FHN February 21, 2025
A malware campaign spreading XLoader malware uses DLL side-loading by exploiting a legitimate Eclipse Foundation tool, jarsigner,...
Read More Read more about Cybercriminals Deploy XLoader Malware Using Eclipse Jarsigner in ZIP Archives
Phishing targets CEOs, CTOs, and top decision-makers Phishing-Scams-1
  • phishing
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Phishing targets CEOs, CTOs, and top decision-makers

FHN February 21, 2025
A recent phishing campaign by Hackmosphere exposed vulnerabilities among top decision-makers, like CEOs and CTOs. The study...
Read More Read more about Phishing targets CEOs, CTOs, and top decision-makers
Fake Chrome Update Drops DriverEasy Malware via Dropbox dropbox-rounded-icon-2048x2048-8gdnefgc
  • malicious cyber actors
  • google
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Fake Chrome Update Drops DriverEasy Malware via Dropbox

FHN February 20, 2025
Researchers discovered that the malware, disguised as a Chrome update, uses Dropbox’s API to steal credentials and...
Read More Read more about Fake Chrome Update Drops DriverEasy Malware via Dropbox
PoC exploit released for vulnerabilities in Ivanti Endpoint Manager Alert-Ivanti-Discloses-2-New-Zero-Day-Flaws-One-Under-Active-Exploitation (3)
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

PoC exploit released for vulnerabilities in Ivanti Endpoint Manager

FHN February 20, 2025
Researchers found four critical Ivanti EPM vulnerabilities allowing unauthenticated attackers to exploit machine credentials for relay attacks....
Read More Read more about PoC exploit released for vulnerabilities in Ivanti Endpoint Manager
New LLM Vulnerability Puts AI Models Like ChatGPT at Risk 0x0
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update

New LLM Vulnerability Puts AI Models Like ChatGPT at Risk

FHN February 19, 2025
A newly discovered vulnerability in LLMs like ChatGPT raises concerns about adversarial attacks, where techniques like prompt...
Read More Read more about New LLM Vulnerability Puts AI Models Like ChatGPT at Risk
Researchers Seek to Strengthen MITRE ATT&CK Against New Threats 1662469456033
  • Mobile Security
  • Internet Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

Researchers Seek to Strengthen MITRE ATT&CK Against New Threats

FHN February 18, 2025
A recent study from the National University of Singapore and NCS Cyber Special Ops R&D examines how...
Read More Read more about Researchers Seek to Strengthen MITRE ATT&CK Against New Threats
Obfuscated .NET sectopRAT mimics a Chrome extension 1_1HiMZ1JFtQ2vaXL9z8dkDg
  • google
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Obfuscated .NET sectopRAT mimics a Chrome extension

FHN February 18, 2025
SectopRAT (Arechclient2) is a highly obfuscated .NET-based Remote Access Trojan (RAT). Researchers recently found it posing as...
Read More Read more about Obfuscated .NET sectopRAT mimics a Chrome extension
Malware on WordPress sites lets hackers run remote code wordpress-g74a560834_1280
  • wordpress
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Malware on WordPress sites lets hackers run remote code

FHN February 17, 2025
Researchers found malware targeting WordPress sites, using backdoors for remote code execution. The attacks exploit vulnerabilities, highlighting...
Read More Read more about Malware on WordPress sites lets hackers run remote code
RansomHub Now Targets Windows, ESXi, Linux, and FreeBSD 1732156681842
  • BOTNET
  • Exploitation
  • Linux Malware
  • Malware
  • Ransomware
  • windows

RansomHub Now Targets Windows, ESXi, Linux, and FreeBSD

FHN February 17, 2025
RansomHub has rapidly emerged as a major cybercrime syndicate in 2024–2025, expanding its arsenal to target Windows,...
Read More Read more about RansomHub Now Targets Windows, ESXi, Linux, and FreeBSD
Burp Suite 2025.2 Released with AI Integration hq720
  • Tips
  • Internet Security
  • Security Advisory
  • Security Update

Burp Suite 2025.2 Released with AI Integration

FHN February 14, 2025
PortSwigger released Burp Suite 2025.2, adding AI integration to the Montoya API for smarter, AI-powered extensions. Bug...
Read More Read more about Burp Suite 2025.2 Released with AI Integration
Chinese APT Group Actively Exploiting New Windows UI 0-Day Vulnerability Vulnerability-Management-in-Projekten
  • Zero Day Attack
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Chinese APT Group Actively Exploiting New Windows UI 0-Day Vulnerability

FHN February 14, 2025
ClearSky Cyber Security has identified a UI vulnerability in Microsoft Windows exploited by Mustang Panda, a threat...
Read More Read more about Chinese APT Group Actively Exploiting New Windows UI 0-Day Vulnerability
WordPress Plugin Flaw Allowed Hackers to Target 30,000 Websites wordpress
  • wordpress
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

WordPress Plugin Flaw Allowed Hackers to Target 30,000 Websites

FHN February 13, 2025
A subgroup of Russia’s state-backed hacker group Seashell Blizzard (Sandworm) has ramped up cyberattacks under a campaign...
Read More Read more about WordPress Plugin Flaw Allowed Hackers to Target 30,000 Websites
OpenAI Creating Its Own Chip to Cut Nvidia Dependence images
  • Tips
  • Internet Security
  • Security Advisory
  • Security Update

OpenAI Creating Its Own Chip to Cut Nvidia Dependence

FHN February 13, 2025
OpenAI is advancing its efforts to reduce reliance on Nvidia by developing its first in-house AI chip....
Read More Read more about OpenAI Creating Its Own Chip to Cut Nvidia Dependence
New York Bans DeepSeek Due to Potential Data Risks 1738311990-tech
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

New York Bans DeepSeek Due to Potential Data Risks

FHN February 12, 2025
New York Governor Kathy Hochul announced a ban on the use of the China-based AI startup DeepSeek...
Read More Read more about New York Bans DeepSeek Due to Potential Data Risks
Microsoft Patch Tuesday (Feb 2025): 61 Vulnerabilities, 25 RCE, 3 Zero-Day this-month-s-patch-tuesday-
  • Microsoft
  • Internet Security
  • RCE Flaw
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Microsoft Patch Tuesday (Feb 2025): 61 Vulnerabilities, 25 RCE, 3 Zero-Day

FHN February 11, 2025
Microsoft’s February 2025 Patch Tuesday fixes multiple vulnerabilities, including critical RCE and privilege escalation flaws. Users and...
Read More Read more about Microsoft Patch Tuesday (Feb 2025): 61 Vulnerabilities, 25 RCE, 3 Zero-Day
Fortinet Zero-Day Exploited to Hijack Firewall & Gain Super Admin desktop-wallpaper-animation-fortinet
  • Zero Day Attack
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Fortinet Zero-Day Exploited to Hijack Firewall & Gain Super Admin

FHN February 11, 2025
Fortinet has issued an urgent warning about a critical zero-day vulnerability (CVE-2025-24472) in FortiOS and FortiProxy. The...
Read More Read more about Fortinet Zero-Day Exploited to Hijack Firewall & Gain Super Admin
Microsoft SharePoint Connector flaw enables credential theft 6474a762824b738821485bfc_6273d51524d8c764f1299b2a_IntroToSharepoint_Thumbnail(2)
  • Microsoft
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Microsoft SharePoint Connector flaw enables credential theft

FHN February 10, 2025
A critical SSRF flaw in Microsoft Power Platform’s SharePoint connector let attackers steal credentials and impersonate users...
Read More Read more about Microsoft SharePoint Connector flaw enables credential theft
Apple 0-Day Vulnerability Exploited in Highly Sophisticated Attacks apple-keyway-800x450
  • Apple
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Apple 0-Day Vulnerability Exploited in Highly Sophisticated Attacks

FHN February 10, 2025
Apple released iOS 18.3.1 and iPadOS 18.3.1 to fix a zero-day vulnerability exploited in targeted attacks by...
Read More Read more about Apple 0-Day Vulnerability Exploited in Highly Sophisticated Attacks
Hackers are brute-forcing web login pages of popular firewalls 18240753
  • Exploitation
  • BOTNET
  • Compromised
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Hackers are brute-forcing web login pages of popular firewalls

FHN February 7, 2025
ShadowServer reports a surge in brute-force attacks on edge device logins, with up to 2.8 million IPs...
Read More Read more about Hackers are brute-forcing web login pages of popular firewalls
New Malware Targets Indian Bank Users for Aadhar, PAN, and PIN Theft smartphone malware concept. 3d render.
  • malicious cyber actors
  • Internet Security
  • Malware
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update

New Malware Targets Indian Bank Users for Aadhar, PAN, and PIN Theft

FHN February 6, 2025
A recent cybersecurity threat in India targets users of various banks with a sophisticated malware campaign. Discovered...
Read More Read more about New Malware Targets Indian Bank Users for Aadhar, PAN, and PIN Theft
MacOS password-stealing malware is spreading rapidly password_brian_Jackson_AlamyStockPhoto
  • MacOS
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

MacOS password-stealing malware is spreading rapidly

FHN February 6, 2025
MacOS users are seeing a sharp rise in password-stealing malware, spread through fake apps and ads. Leading...
Read More Read more about MacOS password-stealing malware is spreading rapidly
Critical IBM Cloud Pak Vulnerabilities Expose Systems to Remote Code Execution 0_kkaGvh1becPyBI7K
  • vulnerability
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update
  • Tips

Critical IBM Cloud Pak Vulnerabilities Expose Systems to Remote Code Execution

FHN February 6, 2025
IBM released critical updates for Cloud Pak for Business Automation, fixing vulnerabilities that could expose sensitive data,...
Read More Read more about Critical IBM Cloud Pak Vulnerabilities Expose Systems to Remote Code Execution
Zero-Day Flaws in Sysinternals Enable DLL Injection on Windows 1715573754341
  • Zero Day Attack
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips
  • windows

Zero-Day Flaws in Sysinternals Enable DLL Injection on Windows

FHN February 6, 2025
A zero-day vulnerability in Microsoft Sysinternals tools exposes Windows systems to DLL injection attacks, allowing attackers to...
Read More Read more about Zero-Day Flaws in Sysinternals Enable DLL Injection on Windows
BADBOX Botnet Infects 190,000+ Android Devices Screenshot 2025-02-05 165118
  • BOTNET
  • Android malware
  • Compromised
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

BADBOX Botnet Infects 190,000+ Android Devices

FHN February 5, 2025
The BADBOX botnet has infected over 192,000 Android devices worldwide, expanding from low-cost brands to major ones...
Read More Read more about BADBOX Botnet Infects 190,000+ Android Devices
1-Click RCE Flaw in Voyager PHP Lets Attackers Run Arbitrary Code download
  • vulnerability
  • Internet Security
  • RCE Flaw
  • Security Advisory
  • Security Update
  • Tips

1-Click RCE Flaw in Voyager PHP Lets Attackers Run Arbitrary Code

FHN February 5, 2025
A newly found flaw in Voyager PHP, a Laravel management tool, risks RCE on affected servers. Discovered...
Read More Read more about 1-Click RCE Flaw in Voyager PHP Lets Attackers Run Arbitrary Code
Android Update Fixes Linux Kernel RCE Flaw MalwareAndroid_720
  • Malware
  • Android malware
  • Internet Security
  • RCE Flaw
  • Security Advisory
  • Security Update
  • vulnerability

Android Update Fixes Linux Kernel RCE Flaw

FHN February 4, 2025
On February 3, 2025, Google released the February Android Security Bulletin, fixing 47 vulnerabilities. One major flaw,...
Read More Read more about Android Update Fixes Linux Kernel RCE Flaw
Hackers Leverage AWS and Microsoft Azure for Massive Cyber Attacks Digital data security padlock on futuristic circuit board
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Hackers Leverage AWS and Microsoft Azure for Massive Cyber Attacks

FHN February 3, 2025
Silent Push coined “infrastructure laundering” to describe cybercriminals exploiting cloud services for illegal activities. They rent IPs...
Read More Read more about Hackers Leverage AWS and Microsoft Azure for Massive Cyber Attacks
Phishing Attack Hijacks X Accounts to Promote Scams Phishing-Scams-768-x-512
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

Phishing Attack Hijacks X Accounts to Promote Scams

FHN February 3, 2025
A new phishing campaign is targeting high-profile X (formerly Twitter) accounts. SentinelLABS found that attackers aim to...
Read More Read more about Phishing Attack Hijacks X Accounts to Promote Scams
Cybercriminals Use GitHub to Distribute Lumma Stealer malware
  • BOTNET
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Cybercriminals Use GitHub to Distribute Lumma Stealer

FHN January 31, 2025
Trend Micro’s Managed XDR team recently uncovered a malware campaign using GitHub’s release infrastructure to spread Lumma...
Read More Read more about Cybercriminals Use GitHub to Distribute Lumma Stealer
DeepSeek’s rise fuels more fraud and phishing attacks DeepSeek-Disrupts-AI-Market-with-Low-Cost-Training-and-Open-Source-Yet-Many-Questions-Loom-e1738274615580
  • phishing
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

DeepSeek’s rise fuels more fraud and phishing attacks

FHN January 31, 2025
DeepSeek, a fast-growing Chinese AI company, has shaken up the industry and caught cybercriminals’ attention. After its...
Read More Read more about DeepSeek’s rise fuels more fraud and phishing attacks
Google blocked 2.28 million malicious apps from the Play Store 4366b93fcedd1f9c09ac445622b01aea
  • Tips
  • google
  • Internet Security
  • Mobile Security
  • Regulation
  • Security Advisory
  • Security Update

Google blocked 2.28 million malicious apps from the Play Store

FHN January 31, 2025
Google announced it blocked a record 2.28 million policy-violating apps from the Play Store in 2023. It...
Read More Read more about Google blocked 2.28 million malicious apps from the Play Store
New Apple SLAP & FLOP Attacks Can Steal Browser Login Details apple-security-hns2
  • Apple
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

New Apple SLAP & FLOP Attacks Can Steal Browser Login Details

FHN January 29, 2025
Researchers from Georgia Tech and Ruhr University Bochum discovered two new speculative execution attacks, SLAP and FLOP,...
Read More Read more about New Apple SLAP & FLOP Attacks Can Steal Browser Login Details
Apple Releases Security Update: Patches for iOS Zero-Day and macOS apple-security-hns1
  • Apple
  • Internet Security
  • MacOS
  • Security Advisory
  • Security Update
  • Tips
  • Zero Day Attack

Apple Releases Security Update: Patches for iOS Zero-Day and macOS

FHN January 28, 2025
Apple released security updates for iOS, macOS, and more to address a new zero-day vulnerability, reinforcing its...
Read More Read more about Apple Releases Security Update: Patches for iOS Zero-Day and macOS
Microsoft Introduces Phishing Protection for Teams Chat scammers-microsoft-team-gifs-phishing-attacks
  • Microsoft
  • Internet Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

Microsoft Introduces Phishing Protection for Teams Chat

FHN January 28, 2025
Microsoft has introduced a new phishing protection feature for Teams to enhance cybersecurity. The feature alerts users...
Read More Read more about Microsoft Introduces Phishing Protection for Teams Chat
Apache Solr Flaw Grants Attackers Write Access apache_solr
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Apache Solr Flaw Grants Attackers Write Access

FHN January 27, 2025
A new Apache Solr vulnerability, affecting versions 6.6 to 9.7.0, exposes Windows instances to risks of file...
Read More Read more about Apache Solr Flaw Grants Attackers Write Access
Android Kiosk Tablet Flaw Let Hackers Control AC and Lights GiDPzq5XIAAN2iK
  • malicious cyber actors
  • Android malware
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Android Kiosk Tablet Flaw Let Hackers Control AC and Lights

FHN January 24, 2025
A flaw in Android kiosk tablets at luxury hotels let attackers remotely control room functions, risking guest...
Read More Read more about Android Kiosk Tablet Flaw Let Hackers Control AC and Lights
Mirai Botnet Launches Record-Breaking 5.6 Tbps DDoS Attack Security concept: DDOS Attack on Digital background
  • BOTNET
  • DDOS
  • Exploitation
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips

Mirai Botnet Launches Record-Breaking 5.6 Tbps DDoS Attack

FHN January 23, 2025
On October 29, 2024, the Mirai botnet launched a record-breaking DDoS attack, peaking at 5.6 terabits per...
Read More Read more about Mirai Botnet Launches Record-Breaking 5.6 Tbps DDoS Attack
Best Automated Patch Management Software in 2025 Screenshot 2025-01-22 131706
  • Tips
  • Internet Security
  • Security Advisory
  • Security Update

Best Automated Patch Management Software in 2025

FHN January 23, 2025
Keeping systems and applications up to date is critical for security and performance in today’s rapidly evolving...
Read More Read more about Best Automated Patch Management Software in 2025
Helldown Ransomware Exploits Zyxel Zero-Day Vulnerability Ransomware red button on keyboard, 3D rendering
  • Security Update
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • vulnerability
  • Zero Day Attack

Helldown Ransomware Exploits Zyxel Zero-Day Vulnerability

FHN January 23, 2025
A new ransomware, “Helldown,” is exploiting vulnerabilities in Zyxel firewalls to breach corporate networks. Researchers have linked...
Read More Read more about Helldown Ransomware Exploits Zyxel Zero-Day Vulnerability
Windows File Explorer Privilege Escalation (CVE-2024-38100) Exploited devsecops-t
  • Tips
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • windows

Windows File Explorer Privilege Escalation (CVE-2024-38100) Exploited

FHN January 22, 2025
A critical Windows File Explorer flaw, CVE-2024-38100, has been exploited, allowing attackers to gain admin-level access through...
Read More Read more about Windows File Explorer Privilege Escalation (CVE-2024-38100) Exploited
SQL Injection Vulnerability in Microsoft DevBlogs Enables Malicious SQL Screenshot 2025-01-22 111423
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

SQL Injection Vulnerability in Microsoft DevBlogs Enables Malicious SQL

FHN January 22, 2025
A security researcher recently discovered a critical SQL injection vulnerability on Microsoft’s DevBlogs site (https://devblogs.microsoft.com), allowing attackers...
Read More Read more about SQL Injection Vulnerability in Microsoft DevBlogs Enables Malicious SQL
FunkSec Ransomware Leads December Attacks, Compromising 85 Victims 2d illustration ransomware computer virus
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update

FunkSec Ransomware Leads December Attacks, Compromising 85 Victims

FHN January 21, 2025
FunkSec, a RaaS operator, utilizes artificial intelligence to evolve threat actor strategies. While AI aids in scaling...
Read More Read more about FunkSec Ransomware Leads December Attacks, Compromising 85 Victims
ChatGPT Crawler Flaw Enables DDoS Attacks on Websites e63a0910-91b3-11ed-a5ef-e0922b9825e0
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

ChatGPT Crawler Flaw Enables DDoS Attacks on Websites

FHN January 21, 2025
A critical vulnerability in OpenAI’s ChatGPT API allows attackers to launch DDoS attacks on arbitrary websites by...
Read More Read more about ChatGPT Crawler Flaw Enables DDoS Attacks on Websites
Azure DevOps flaws allow CRLF injection and DNS rebinding attacks Azure-DevOps-Logo
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Azure DevOps flaws allow CRLF injection and DNS rebinding attacks

FHN January 20, 2025
Security researchers have uncovered multiple Azure DevOps vulnerabilities, enabling CRLF injection and DNS rebinding attacks. Discovered by...
Read More Read more about Azure DevOps flaws allow CRLF injection and DNS rebinding attacks
Apple is offering an Information Security Internship – Apply Now Detail from Apple shop in Tokyo, Japan. Apple is American multinational corporation founded at 1976 at Cupertino, California.
  • Security Update
  • Apple
  • Security Advisory

Apple is offering an Information Security Internship – Apply Now

FHN January 20, 2025
Apple has announced an exciting Information Security Internship in London, designed for tech-savvy students passionate about starting...
Read More Read more about Apple is offering an Information Security Internship – Apply Now
Pumakit: Advanced Linux Rootkit Targets Critical Infrastructure linux-bug
  • BOTNET
  • Exploitation
  • Internet Security
  • Linux Malware
  • Malware
  • Security Advisory
  • Security Update
  • Tips

Pumakit: Advanced Linux Rootkit Targets Critical Infrastructure

FHN January 18, 2025
A highly sophisticated Linux rootkit, Pumakit, has been identified targeting critical infrastructure sectors like telecommunications, finance, and...
Read More Read more about Pumakit: Advanced Linux Rootkit Targets Critical Infrastructure
Microsoft Teams now lets users customize notification banner positions teams-article-cover
  • Microsoft
  • Internet Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

Microsoft Teams now lets users customize notification banner positions

FHN January 18, 2025
Microsoft Teams now lets users customize banner notification positions to improve focus and productivity. This feature is...
Read More Read more about Microsoft Teams now lets users customize notification banner positions
AWS Addresses Security Flaws in WorkSpaces, AppStream 2.0, and DCV aws
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

AWS Addresses Security Flaws in WorkSpaces, AppStream 2.0, and DCV

FHN January 18, 2025
AWS has issued a critical security advisory for vulnerabilities in certain versions of its clients for Amazon...
Read More Read more about AWS Addresses Security Flaws in WorkSpaces, AppStream 2.0, and DCV
New Tool Launched to Detect Hacking Content on Telegram Telegram (1)1688129037778
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

New Tool Launched to Detect Hacking Content on Telegram

FHN January 18, 2025
A Russian developer, supported by the National Technology Initiative, has launched the Apparatus Sapiens AI module to...
Read More Read more about New Tool Launched to Detect Hacking Content on Telegram
‘Sneaky 2FA’ Phishing Kit Bypasses Microsoft 365 Authentication Phishing-Attacks-That-Can-Impact-Your-Business-image
  • Security Update
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • phishing
  • Security Advisory

‘Sneaky 2FA’ Phishing Kit Bypasses Microsoft 365 Authentication

FHN January 18, 2025
Researchers have discovered “Sneaky 2FA,” a phishing kit targeting Microsoft 365 accounts to steal credentials and bypass...
Read More Read more about ‘Sneaky 2FA’ Phishing Kit Bypasses Microsoft 365 Authentication
Exploit Enables NTLMv1 Despite Active Directory Limits 1695755668151
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Exploit Enables NTLMv1 Despite Active Directory Limits

FHN January 16, 2025
Researchers discovered a misconfiguration in on-premise applications that bypasses Active Directory Group Policy meant to disable NTLMv1,...
Read More Read more about Exploit Enables NTLMv1 Despite Active Directory Limits
Hackers Exploit YouTube Links and Microsoft 365 Themes to Steal Logins passwords-hackers-theft
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

Hackers Exploit YouTube Links and Microsoft 365 Themes to Steal Logins

FHN January 15, 2025
Cybercriminals are running advanced phishing attacks on Microsoft 365 users using fake URLs that closely resemble real...
Read More Read more about Hackers Exploit YouTube Links and Microsoft 365 Themes to Steal Logins
Hackers Exploit Zero-Day in Fortinet Firewalls fortinet
  • Exploitation
  • BOTNET
  • Internet Security
  • Security Advisory
  • Security Update
  • Zero Day Attack

Hackers Exploit Zero-Day in Fortinet Firewalls

FHN January 14, 2025
Hackers are targeting Fortinet FortiGate firewalls with exposed management interfaces online. Arctic Wolf reports that between November...
Read More Read more about Hackers Exploit Zero-Day in Fortinet Firewalls
Microsoft Alerts Microsoft 365 Users to MFA Issue shutterstock_2430699767-768x512
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Microsoft Alerts Microsoft 365 Users to MFA Issue

FHN January 13, 2025
Microsoft has warned of an MFA issue affecting some Microsoft 365 users, blocking access to certain applications...
Read More Read more about Microsoft Alerts Microsoft 365 Users to MFA Issue
Juniper Networks Flaw Allowed Remote Network Attacks juniper-networks-boosts-intentbased-multivendor-networking-solution
  • BOTNET
  • Exploitation
  • Internet Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Juniper Networks Flaw Allowed Remote Network Attacks

FHN January 10, 2025
Juniper Networks disclosed CVE-2025-21598, a critical vulnerability in Junos OS and Junos OS Evolved, allowing remote attackers...
Read More Read more about Juniper Networks Flaw Allowed Remote Network Attacks
LDAP Exploit Delivers Info-Stealing Malware malware
  • Exploitation
  • BOTNET
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

LDAP Exploit Delivers Info-Stealing Malware

FHN January 10, 2025
Cybercriminals are exploiting critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept (PoC) exploits for “LDAPNightmare”...
Read More Read more about LDAP Exploit Delivers Info-Stealing Malware
PriveShield: Advanced Privacy with Profile Isolation 879e3198-5202-4034-a56b-65bfdb9e2f40
  • Tips
  • Internet Security
  • Security Advisory
  • Security Update

PriveShield: Advanced Privacy with Profile Isolation

FHN January 8, 2025
The PRIVESHIELD browser extension automatically creates isolated profiles to group websites based on browsing habits and interactions,...
Read More Read more about PriveShield: Advanced Privacy with Profile Isolation
Chrome Update: Fixes for Multiple Security Flaws 1684015349_chrome-fast
  • google
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Chrome Update: Fixes for Multiple Security Flaws

FHN January 8, 2025
Google has updated Chrome to version 131.0.6778.264/.265 for Windows and Mac, and 131.0.6778.264 for Linux, fixing critical...
Read More Read more about Chrome Update: Fixes for Multiple Security Flaws
Hackers breached Argentina’s airport security payroll system Argentinas_Airport_Security_Payroll_System_Targeted_in_Cyberattack1_Main
  • Internet Security
  • Compromised
  • Data Breach
  • Security Advisory
  • Security Update

Hackers breached Argentina’s airport security payroll system

FHN January 7, 2025
Hackers breached Argentina’s Airport Security Police (PSA) payroll system, exposing sensitive employee information. They accessed salary records...
Read More Read more about Hackers breached Argentina’s airport security payroll system
WordPress Plugin Exploits Websites to Steal Customer Payment Information WordPress
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

WordPress Plugin Exploits Websites to Steal Customer Payment Information

FHN January 7, 2025
Cybercriminals created PhishWP, a malicious WordPress plugin, to mimic payment gateways like Stripe for phishing attacks on...
Read More Read more about WordPress Plugin Exploits Websites to Steal Customer Payment Information
Android Security Update Fixes Critical RCE Vulnerabilities guide-to-painless-Android-updates-featured
  • Android malware
  • Internet Security
  • Malware
  • Mobile Security
  • RCE Flaw
  • Security Advisory
  • Security Update
  • vulnerability

Android Security Update Fixes Critical RCE Vulnerabilities

FHN January 7, 2025
The January 2025 Android Security Bulletin highlights critical vulnerabilities affecting Android devices. Users should update to security...
Read More Read more about Android Security Update Fixes Critical RCE Vulnerabilities
WordPress Plugin Flaw Puts 3 Million Sites at Risk of Injection Attacks wordpress0-1060x424-1
  • BOTNET
  • Exploitation
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability
  • wordpress

WordPress Plugin Flaw Puts 3 Million Sites at Risk of Injection Attacks

FHN January 6, 2025
A critical vulnerability has been found in the UpdraftPlus: WP Backup & Migration Plugin, affecting over 3...
Read More Read more about WordPress Plugin Flaw Puts 3 Million Sites at Risk of Injection Attacks
Critical OpenSSH Vulnerability (CVE-2024-6387) Exploit Released OpenSSH-RCE-Vulnerability-1200x794-1
  • Exploitation
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update
  • vulnerability

Critical OpenSSH Vulnerability (CVE-2024-6387) Exploit Released

FHN January 6, 2025
A PoC exploit for the critical OpenSSH vulnerability CVE-2024-6387 has been released, enabling remote attackers to execute...
Read More Read more about Critical OpenSSH Vulnerability (CVE-2024-6387) Exploit Released
Apple Settles Siri Privacy Lawsuit for $95M 1594151872361
  • Apple
  • Internet Security
  • Security Advisory
  • Security Update

Apple Settles Siri Privacy Lawsuit for $95M

FHN January 3, 2025
Apple has agreed to pay $95 million to settle a class-action lawsuit claiming Siri violated users’ privacy...
Read More Read more about Apple Settles Siri Privacy Lawsuit for $95M
ASUS Vulnerabilities Allow Arbitrary Command Execution 62854-060e407f61d869e96f982a53d99a2e04
  • Exploitation
  • Arbitrary Code Execution
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

ASUS Vulnerabilities Allow Arbitrary Command Execution

FHN January 3, 2025
ASUS warns of critical router flaws (CVE-2024-12912, CVE-2024-13062) allowing arbitrary command execution. Users are urged to update...
Read More Read more about ASUS Vulnerabilities Allow Arbitrary Command Execution
Cyberhaven Chrome Extension Compromised, Potentially Impacting 400,000 Users d945de1846d45e8d88a0a0fba1fbead0
  • BOTNET
  • Compromised
  • Data Breach
  • Security Advisory
  • Security Update

Cyberhaven Chrome Extension Compromised, Potentially Impacting 400,000 Users

FHN December 31, 2024
Cyberhaven, a cybersecurity company, revealed that its Chrome extension, with over 400,000 users, was targeted in a...
Read More Read more about Cyberhaven Chrome Extension Compromised, Potentially Impacting 400,000 Users
PoC Exploit Released for Oracle WebLogic Vulnerability vulnerability
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

PoC Exploit Released for Oracle WebLogic Vulnerability

FHN December 31, 2024
Researchers warn of a public PoC exploit for a critical Oracle WebLogic vulnerability. Oracle WebLogic Vulnerability The...
Read More Read more about PoC Exploit Released for Oracle WebLogic Vulnerability
Microsoft warns of a Windows 11 24H2 issue blocking security updates IMG_0814
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Microsoft warns of a Windows 11 24H2 issue blocking security updates

FHN December 31, 2024
Microsoft has warned of an issue affecting Windows 11 version 24H2 that blocks critical security updates. The...
Read More Read more about Microsoft warns of a Windows 11 24H2 issue blocking security updates
New Botnet exploits D-Link routers for remote control 1715724857120
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

New Botnet exploits D-Link routers for remote control

FHN December 30, 2024
Researchers observed increased activity from the “FICORA” and “CAPSAICIN” variants, which exploit vulnerabilities in outdated D-Link routers...
Read More Read more about New Botnet exploits D-Link routers for remote control
IBM AIX TCP/IP vulnerability allows Denial of Service attacks ICS-vulnerabilities-cybersecurity-feature-May-9-2022-web
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

IBM AIX TCP/IP vulnerability allows Denial of Service attacks

FHN December 27, 2024
IBM has warned of two security flaws (CVE-2024-47102 and CVE-2024-52906) in its AIX operating system that could...
Read More Read more about IBM AIX TCP/IP vulnerability allows Denial of Service attacks
Adobe warns of ColdFusion file-reading vulnerability security-alert-zero-day-exploit-slamming-coldfusion-sites-showcase_image-9-a-22571
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Adobe warns of ColdFusion file-reading vulnerability

FHN December 27, 2024
Adobe released a critical security update for ColdFusion to address a vulnerability that allows attackers to read...
Read More Read more about Adobe warns of ColdFusion file-reading vulnerability
Araneida Scanner – Hackers Exploit Cracked Acunetix Scanner Vulnerability-Management-Program-Best-Practices-1
  • Tips
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Araneida Scanner – Hackers Exploit Cracked Acunetix Scanner

FHN December 26, 2024
Threat analysts report the “Araneida Scanner,” based on a cracked Acunetix version, is used for illegal activities...
Read More Read more about Araneida Scanner – Hackers Exploit Cracked Acunetix Scanner
Node.js systeminformation Package Enables RCE Attacks Vulnerability-Management-in-Projekten
  • vulnerability
  • Internet Security
  • RCE Flaw
  • Security Advisory
  • Security Update

Node.js systeminformation Package Enables RCE Attacks

FHN December 25, 2024
A critical command injection vulnerability in the systeminformation npm package, CVE-2024-56334, exposes millions of systems to RCE...
Read More Read more about Node.js systeminformation Package Enables RCE Attacks
Malicious Amazon Appstore apps record screens and intercept OTPs 1734719742629
  • malicious cyber actors
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Malicious Amazon Appstore apps record screens and intercept OTPs

FHN December 23, 2024
The “BMI CalculationVsn” app on the Amazon App Store secretly collects sensitive data, like app package names...
Read More Read more about Malicious Amazon Appstore apps record screens and intercept OTPs
Skuld Malware Exploits Windows Utilities Packages Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • windows

Skuld Malware Exploits Windows Utilities Packages

FHN December 23, 2024
Researchers uncovered a malware campaign in the npm ecosystem, where “k303903” used fake packages to spread the...
Read More Read more about Skuld Malware Exploits Windows Utilities Packages
BADBOX botnet hacked 74,000 Android devices with remote codes android-malware
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

BADBOX botnet hacked 74,000 Android devices with remote codes

FHN December 19, 2024
BADBOX is a cybercriminal operation that infects Android devices, like TV boxes and smartphones, with malware before...
Read More Read more about BADBOX botnet hacked 74,000 Android devices with remote codes
Malicious supply chain attacks shift from npm to VSCode Marketplace SeroXen-RAT-Delivered-via-Malicious-NuGet
  • BOTNET
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Malicious supply chain attacks shift from npm to VSCode Marketplace

FHN December 19, 2024
Researchers have observed a rise in malicious activity on the VSCode Marketplace, exposing its vulnerability to supply...
Read More Read more about Malicious supply chain attacks shift from npm to VSCode Marketplace
Careto: A Notorious Threat Group Targets Windows with Microphone Recording and File Theft Windows-Alert-2
  • Malware
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • windows

Careto: A Notorious Threat Group Targets Windows with Microphone Recording and File Theft

FHN December 18, 2024
Recent research links The Mask group to a 2022 attack on a Latin American organization, exploiting an...
Read More Read more about Careto: A Notorious Threat Group Targets Windows with Microphone Recording and File Theft
New VIPKeyLogger in Office Docs Steals Credentials 360_F_823644553_2RClv1DaJc9ZBI5UueIogprPANwFi9cP
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

New VIPKeyLogger in Office Docs Steals Credentials

FHN December 18, 2024
VIPKeyLogger, similar to the Snake Keylogger, spreads through phishing campaigns via attachments disguised as archive or Microsoft...
Read More Read more about New VIPKeyLogger in Office Docs Steals Credentials
Hackers Exploit Windows Management Console for Backdoor Payloads botnet-concept
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers Exploit Windows Management Console for Backdoor Payloads

FHN December 18, 2024
The FLUX#CONSOLE campaign exploits .MSC files to deploy backdoor malware, highlighting advanced phishing and Windows feature abuse....
Read More Read more about Hackers Exploit Windows Management Console for Backdoor Payloads
Malicious ads on CAPTCHA pages spread password stealers password
  • Tips
  • Internet Security
  • Security Advisory
  • Security Update

Malicious ads on CAPTCHA pages spread password stealers

FHN December 18, 2024
Cybercriminals are using fake CAPTCHA pages to spread password-stealing malware. These fake CAPTCHAs, often appearing as pop-ups,...
Read More Read more about Malicious ads on CAPTCHA pages spread password stealers
Hackers exploit Apache Struts2 flaw to upload malware t01ec10d12d87d912fe
  • malicious cyber actors
  • Internet Security
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Hackers exploit Apache Struts2 flaw to upload malware

FHN December 16, 2024
Hackers are exploiting a new Apache Struts2 vulnerability (CVE-2024-53677) with a critical CVSS score of 9.5, posing...
Read More Read more about Hackers exploit Apache Struts2 flaw to upload malware
Hackers Exploit Microsoft Teams for Remote System Access scammers-microsoft-team-gifs-phishing-attacks
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Microsoft
  • Security Advisory
  • Security Update

Hackers Exploit Microsoft Teams for Remote System Access

FHN December 16, 2024
Hackers used Microsoft Teams to trick victims into granting remote system access, showcasing advanced social engineering tactics,...
Read More Read more about Hackers Exploit Microsoft Teams for Remote System Access
Dell Security Update Patches Multiple Critical Vulnerabilities 1647944981994
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update

Dell Security Update Patches Multiple Critical Vulnerabilities

FHN December 13, 2024
Dell Technologies has issued a security advisory for critical vulnerabilities that could be exploited by attackers. Customers...
Read More Read more about Dell Security Update Patches Multiple Critical Vulnerabilities
Stealthy Linux Malware PUMAKIT Escalates Privileges images (10)
  • Linux Malware
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Stealthy Linux Malware PUMAKIT Escalates Privileges

FHN December 13, 2024
Researchers at Elastic Security Labs discovered PUMAKIT, a Linux malware using stealth and unique privilege escalation to...
Read More Read more about Stealthy Linux Malware PUMAKIT Escalates Privileges
Emoji Exploit Targets iOS Messenger Group Calls png-transparent-facebook-messenger-iphone-messaging-apps-computer-icons-iphone-blue-angle-electronics
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Emoji Exploit Targets iOS Messenger Group Calls

FHN December 12, 2024
A new vulnerability in Facebook Messenger for iOS could disrupt group calls by exploiting emoji reactions. Discovered...
Read More Read more about Emoji Exploit Targets iOS Messenger Group Calls
Skoda and Volkswagen car vulnerabilities allow hackers to track users remotely cyber-security-3400657_1920
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update

Skoda and Volkswagen car vulnerabilities allow hackers to track users remotely

FHN December 12, 2024
Researchers have found vulnerabilities in the infotainment systems of some Skoda and Volkswagen cars, which could let...
Read More Read more about Skoda and Volkswagen car vulnerabilities allow hackers to track users remotely
Microsoft 365 Services Affected: Web Apps and Admin Center Down gettyimages-1889106808
  • Microsoft
  • Internet Security
  • Security Advisory
  • Security Update

Microsoft 365 Services Affected: Web Apps and Admin Center Down

FHN December 11, 2024
Microsoft is investigating a widespread outage that impacted access to Microsoft 365 web apps and the admin...
Read More Read more about Microsoft 365 Services Affected: Web Apps and Admin Center Down
Meeten Malware Targets macOS and Windows to Steal Logins sddefault (3)
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Meeten Malware Targets macOS and Windows to Steal Logins

FHN December 11, 2024
Realst malware targets Web3 professionals using fake companies like “Meetio” with AI-generated content. Victims are lured into...
Read More Read more about Meeten Malware Targets macOS and Windows to Steal Logins
Microsoft Patch Tuesday : 71 Vulnerabilities Fixed this-month-s-patch-tuesday-
  • Zero Day Attack
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Microsoft Patch Tuesday : 71 Vulnerabilities Fixed

FHN December 11, 2024
Microsoft’s final Patch Tuesday of 2024 addresses 71 vulnerabilities, including 16 critical ones and a zero-day. This...
Read More Read more about Microsoft Patch Tuesday : 71 Vulnerabilities Fixed
Critical Qlik Sense RCE vulnerability discovered qlik-security-fix-900px
  • BOTNET
  • Exploitation
  • Internet Security
  • RCE Flaw
  • Security Advisory
  • Security Update
  • vulnerability

Critical Qlik Sense RCE vulnerability discovered

FHN December 9, 2024
A critical vulnerability in Qlik Sense for Windows may allow remote code execution. It affects all versions...
Read More Read more about Critical Qlik Sense RCE vulnerability discovered
Cipla Allegedly Hacked, Akira Ransomware Claims 70GB Data Stolen Cipla Logo
  • Ransomware
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Cipla Allegedly Hacked, Akira Ransomware Claims 70GB Data Stolen

FHN December 9, 2024
Cipla, an Indian pharmaceutical company, has reportedly been attacked by the Akira ransomware group. The hackers claim...
Read More Read more about Cipla Allegedly Hacked, Akira Ransomware Claims 70GB Data Stolen
Google Launches Vanir: An open-source tool for validating security patches google-apps-featured-1-760x570
  • google
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Google Launches Vanir: An open-source tool for validating security patches

FHN December 9, 2024
Google has launched Vanir, an open-source tool to simplify and automate security patch validation. First previewed at...
Read More Read more about Google Launches Vanir: An open-source tool for validating security patches
SonicWall Flaws Enable Remote Code Execution sonicwall-banner2
  • vulnerability
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update

SonicWall Flaws Enable Remote Code Execution

FHN December 6, 2024
SonicWall warns of critical flaws in SMA 100 series appliances, enabling remote code execution, authentication bypass, and...
Read More Read more about SonicWall Flaws Enable Remote Code Execution
HCL DevOps Deploy & Launch Vulnerable to HTML Injection sl-binary-padlock-danger-vulnerability-scaled
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

HCL DevOps Deploy & Launch Vulnerable to HTML Injection

FHN December 6, 2024
A newly discovered vulnerability in HCL Software’s DevOps Deploy and Launch platforms, CVE-2024-42195, allows attackers to insert...
Read More Read more about HCL DevOps Deploy & Launch Vulnerable to HTML Injection
ChatGPT Next Web Vulnerability Allows SSRF Exploits via Endpoint 1681884126418
  • Tips
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

ChatGPT Next Web Vulnerability Allows SSRF Exploits via Endpoint

FHN December 5, 2024
Researchers reported CVE-2023-49785, a critical ChatGPT Next Web (NextChat) vulnerability, raising cybersecurity concerns over its SSRF exploitation...
Read More Read more about ChatGPT Next Web Vulnerability Allows SSRF Exploits via Endpoint
ElizaRAT Uses Google, Telegram, & Slack for C2 Communications SideCopy-has-been-leveraging-a-vulnerability-in-WinRAR-to-deploy-various-RATs-e1699972415699-897x500
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

ElizaRAT Uses Google, Telegram, & Slack for C2 Communications

FHN December 4, 2024
APT36, a Pakistani cyber-espionage group, now uses ElizaRAT, a Windows RAT with advanced evasion and C2 features,...
Read More Read more about ElizaRAT Uses Google, Telegram, & Slack for C2 Communications
Hackers Exploit Windows Event Logs for Manipulation and Data Theft sddefault (2)
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Hackers Exploit Windows Event Logs for Manipulation and Data Theft

FHN December 4, 2024
Hackers exploit wevtutil.exe for LOLBAS attacks, enabling command execution, payload downloads, and persistence while bypassing security. wevtutil.exe...
Read More Read more about Hackers Exploit Windows Event Logs for Manipulation and Data Theft
Apple Safari JavaScriptCore RCE Vulnerability Actively Exploited  vulnerability
  • Apple
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Apple Safari JavaScriptCore RCE Vulnerability Actively Exploited 

FHN December 3, 2024
CVE-2024-44308, a critical Safari vulnerability, has been actively exploited, impacting iOS, visionOS, and macOS. Affected Software and...
Read More Read more about Apple Safari JavaScriptCore RCE Vulnerability Actively Exploited 
Amazon GuardDuty Gains AI/ML Threat Detection for Cloud Security maxresdefault (1)
  • Internet Security
  • cloud
  • Security Advisory
  • Security Update

Amazon GuardDuty Gains AI/ML Threat Detection for Cloud Security

FHN December 2, 2024
Amazon has improved cloud security with AI/ML threat detection in GuardDuty. This new feature enhances threat detection...
Read More Read more about Amazon GuardDuty Gains AI/ML Threat Detection for Cloud Security
HPE IceWall Flaw Enabled Unauthorized Data Changes unnamed (1)
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

HPE IceWall Flaw Enabled Unauthorized Data Changes

FHN December 2, 2024
HPE has released a security alert about a critical flaw in its IceWall product, CVE-2024-11856, which lets...
Read More Read more about HPE IceWall Flaw Enabled Unauthorized Data Changes
Uniswap Labs Announces $15.5M Bug Bounty uniswap-v3-scaled
  • Security Advisory
  • Security Update
  • Tips

Uniswap Labs Announces $15.5M Bug Bounty

FHN November 29, 2024
Uniswap Labs has launched a $15.5 million bug bounty to secure its new protocol, Uniswap v4—the largest...
Read More Read more about Uniswap Labs Announces $15.5M Bug Bounty
Matrix Orchestrates Global DDoS Attack Campaign botnet-concept
  • BOTNET
  • Compromised
  • DDOS
  • Exploitation
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Matrix Orchestrates Global DDoS Attack Campaign

FHN November 28, 2024
Cybersecurity researchers have uncovered a large-scale DDoS campaign attributed to a threat actor known as “Matrix.” Despite...
Read More Read more about Matrix Orchestrates Global DDoS Attack Campaign
Beware of PixPirate Malware Targeting WhatsApp Users mobile-malware
  • BOTNET
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Spam

Beware of PixPirate Malware Targeting WhatsApp Users

FHN November 28, 2024
PixPirate malware is targeting users in Brazil, India, Italy, and Mexico, posing as a fake authentication app...
Read More Read more about Beware of PixPirate Malware Targeting WhatsApp Users
NVIDIA Vulnerability Enables Data Tampering and Privilege Escalation Danger of hack attack
  • Security Update
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Tips
  • vulnerability

NVIDIA Vulnerability Enables Data Tampering and Privilege Escalation

FHN November 27, 2024
NVIDIA has issued a critical security update for a major vulnerability in its Unified Fabric Manager (UFM)...
Read More Read more about NVIDIA Vulnerability Enables Data Tampering and Privilege Escalation
Exploitation of ProjectSend Authentication Vulnerability Discovered in the Wild ICS-vulnerabilities-cybersecurity-feature-May-9-2022-web
  • Tips
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Exploitation of ProjectSend Authentication Vulnerability Discovered in the Wild

FHN November 27, 2024
ProjectSend, an open-source file-sharing web app, is actively being exploited after CVE-2024-11680 was assigned on November 25,...
Read More Read more about Exploitation of ProjectSend Authentication Vulnerability Discovered in the Wild
New Stealthy GodLoader Malware Targets Multiple Platforms malware_fire
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • Tips

New Stealthy GodLoader Malware Targets Multiple Platforms

FHN November 27, 2024
GodLoader malware, discovered by Check Point, stealthily infects Windows, macOS, Linux, Android, and iOS, using the Godot...
Read More Read more about New Stealthy GodLoader Malware Targets Multiple Platforms
RomCom Hackers Exploit Windows Zero-Days & Firefox Vulnerability VRTBlog-min-1
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • windows
  • Zero Day Attack

RomCom Hackers Exploit Windows Zero-Days & Firefox Vulnerability

FHN November 26, 2024
The Russian-aligned group RomCom exploited two critical zero-day vulnerabilities in Mozilla Firefox and Windows in a sophisticated...
Read More Read more about RomCom Hackers Exploit Windows Zero-Days & Firefox Vulnerability
Huge Credit Card Breach: Database of Over 1.2 Million Cards Found on Dark Web _130386731_gettyimages-1161537769
  • BOTNET
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Huge Credit Card Breach: Database of Over 1.2 Million Cards Found on Dark Web

FHN November 26, 2024
A major data breach has caused widespread concern, as a database with sensitive financial details of over...
Read More Read more about Huge Credit Card Breach: Database of Over 1.2 Million Cards Found on Dark Web
Meta has taken down 2 million malicious accounts cd2c8810-a798-11ef-8fff-094e3076ca66
  • malicious cyber actors
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Meta has taken down 2 million malicious accounts

FHN November 26, 2024
Meta has removed over 2 million accounts involved in malicious activities, including complex fraud schemes like “pig...
Read More Read more about Meta has taken down 2 million malicious accounts
Python NodeStealer Targets Facebook Business Accounts for Credential Theft. eDxpDoZ3HxpvAjHmtNb6vhwykzJEdLQ5Dy9pmNS7
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Python NodeStealer Targets Facebook Business Accounts for Credential Theft.

FHN November 26, 2024
The Python-based NodeStealer has evolved, now targeting Facebook Ads Manager budgets, stealing credit card info, and browser...
Read More Read more about Python NodeStealer Targets Facebook Business Accounts for Credential Theft.
Helldown Ransomware Targets ESXi and Linux images (9)
  • Ransomware
  • Internet Security
  • Linux Malware
  • Malware
  • Security Advisory
  • Security Update
  • Tips

Helldown Ransomware Targets ESXi and Linux

FHN November 22, 2024
Helldown, a new ransomware group, has been exploiting vulnerabilities to breach networks and compromise victims since August...
Read More Read more about Helldown Ransomware Targets ESXi and Linux
Two Malicious PyPi Packages Mimicking ChatGPT & Claude Steal Developer Data 1677821145462
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Two Malicious PyPi Packages Mimicking ChatGPT & Claude Steal Developer Data

FHN November 22, 2024
Two malicious Python packages pretending to be tools for ChatGPT and Claude were found on PyPI, the...
Read More Read more about Two Malicious PyPi Packages Mimicking ChatGPT & Claude Steal Developer Data
Trend Micro Deep Security Flaw Allows Remote Code Execution images (2)
  • vulnerability
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update
  • Tips

Trend Micro Deep Security Flaw Allows Remote Code Execution

FHN November 20, 2024
Trend Micro has revealed a critical vulnerability in Deep Security 20 Agent that could allow remote code...
Read More Read more about Trend Micro Deep Security Flaw Allows Remote Code Execution
Hackers Exploit Misconfigured Servers to Stream Live Sports 1722832905164
  • Tips
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Hackers Exploit Misconfigured Servers to Stream Live Sports

FHN November 20, 2024
Recent threat analysis examined outbound traffic and binaries in container environments. Researchers, using honeypot data and threat...
Read More Read more about Hackers Exploit Misconfigured Servers to Stream Live Sports
Apache Kafka Vulnerability Enables Privilege Escalation apache-kafka
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Apache Kafka Vulnerability Enables Privilege Escalation

FHN November 19, 2024
A new vulnerability, CVE-2024-31141, was found in Apache Kafka Clients, allowing attackers to escalate privileges and gain...
Read More Read more about Apache Kafka Vulnerability Enables Privilege Escalation
Citrix Virtual Apps & Desktops Zero-Day Actively Exploited Citrix-headpic
  • BOTNET
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Citrix Virtual Apps & Desktops Zero-Day Actively Exploited

FHN November 19, 2024
A critical unpatched vulnerability has been found in Citrix Virtual Apps and Desktops, now being actively exploited....
Read More Read more about Citrix Virtual Apps & Desktops Zero-Day Actively Exploited
Zohocorp ADAudit Plus SQL Injection Vulnerability manageengine-admanager-plus-software
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Zohocorp ADAudit Plus SQL Injection Vulnerability

FHN November 18, 2024
Zoho released a security update for a critical SQL injection flaw in ADAudit Plus (CVE-2024-49574), fixed in...
Read More Read more about Zohocorp ADAudit Plus SQL Injection Vulnerability
CISA Warns of Exploited Palo Alto Networks Vulnerabilities palo-alto-networks-firewalls-under-attack-hotfixes-incoming-cve-2024-3400
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

CISA Warns of Exploited Palo Alto Networks Vulnerabilities

FHN November 15, 2024
CISA issued an urgent alert for two Palo Alto Networks vulnerabilities, CVE-2024-9463 and CVE-2024-9465, which are actively...
Read More Read more about CISA Warns of Exploited Palo Alto Networks Vulnerabilities
Chinese SilkSpecter hackers targeting Black Friday shoppers ‘SilkSpecter-Campaign-Uses-4000-Fake-Domains-Against-Black-Friday-Shoppers-400x400
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update

Chinese SilkSpecter hackers targeting Black Friday shoppers

FHN November 15, 2024
Chinese hacker group SilkSpecter launched a phishing campaign targeting Black Friday shoppers in Europe and the USA,...
Read More Read more about Chinese SilkSpecter hackers targeting Black Friday shoppers
4M+ WordPress Sites Vulnerable After Plugin Flaw wordpress
  • wordpress
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

4M+ WordPress Sites Vulnerable After Plugin Flaw

FHN November 15, 2024
Critical flaw found in ‘Really Simple Security’ WordPress plugin, risking 4M+ sites. CVE-2024-10924 allows potential remote attacks...
Read More Read more about 4M+ WordPress Sites Vulnerable After Plugin Flaw
Windows 0-Day Exploited with Single Right Click windows-650
  • windows
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Windows 0-Day Exploited with Single Right Click

FHN November 14, 2024
A recently discovered zero-day vulnerability, CVE-2024-43451, is being actively exploited, targeting Windows systems across multiple versions. Identified...
Read More Read more about Windows 0-Day Exploited with Single Right Click
Google to Issue CVEs for Major Cloud Security Flaws sddefault (1)
  • google
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Google to Issue CVEs for Major Cloud Security Flaws

FHN November 14, 2024
Google Cloud will start issuing CVEs for critical vulnerabilities in its services, aiming to boost transparency and...
Read More Read more about Google to Issue CVEs for Major Cloud Security Flaws
Critical Flaw Found in Dell SONiC Cyber-security
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Critical Flaw Found in Dell SONiC

FHN November 13, 2024
Dell Technologies has revealed critical vulnerabilities in its Enterprise SONiC OS (versions 4.1.x and 4.2.x), which could...
Read More Read more about Critical Flaw Found in Dell SONiC
Amazon Confirms Employee Data Breach Through Third-Party Vendor untitled-design-2024-11-12t181047248_7kre
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Amazon Confirms Employee Data Breach Through Third-Party Vendor

FHN November 13, 2024
Amazon confirmed that employee data was exposed due to a breach at a third-party vendor, which exploited...
Read More Read more about Amazon Confirms Employee Data Breach Through Third-Party Vendor
Hackers Use Google Ads to Distribute Fakebat Malware Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • Security Update
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Tips

Hackers Use Google Ads to Distribute Fakebat Malware

FHN November 12, 2024
Researchers have found that Fakebat malware is again being spread through malicious Google Ads, targeting users searching...
Read More Read more about Hackers Use Google Ads to Distribute Fakebat Malware
Roblox Devs Targeted with Malicious npm Packages malware-min-scaled
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update

Roblox Devs Targeted with Malicious npm Packages

FHN November 12, 2024
Researchers found five malicious npm packages targeting Roblox developers, stealing credentials and personal data. These packages, including...
Read More Read more about Roblox Devs Targeted with Malicious npm Packages
Hackers Use Malicious Excel Files to Deliver Remcos RAT to Windows Users Cyber Security Destroyed Concept.padlock Red Open On Electric Ci
  • windows
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers Use Malicious Excel Files to Deliver Remcos RAT to Windows Users

FHN November 11, 2024
Hackers exploit Excel documents due to their popularity and built-in vulnerabilities. With VBA macros now blocked by...
Read More Read more about Hackers Use Malicious Excel Files to Deliver Remcos RAT to Windows Users
Watch Out for Fake Copyright Claims Spreading Rhadamanthys Stealer hero-image.fill.size_1200x675
  • Security Update
  • malicious cyber actors
  • Malware
  • Security Advisory

Watch Out for Fake Copyright Claims Spreading Rhadamanthys Stealer

FHN November 9, 2024
CheckPoint security experts recently warned about fake copyright claims spreading Rhadamanthys stealer malware. Stealer malware is designed...
Read More Read more about Watch Out for Fake Copyright Claims Spreading Rhadamanthys Stealer
Cisco Vulnerability Allowed Attackers to Execute Commands as Root cisco (1)
  • Security Update
  • cisco
  • Internet Security
  • Security Advisory
  • Tips
  • vulnerability

Cisco Vulnerability Allowed Attackers to Execute Commands as Root

FHN November 8, 2024
A critical vulnerability in Cisco Unified Industrial Wireless Software, affecting Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points,...
Read More Read more about Cisco Vulnerability Allowed Attackers to Execute Commands as Root
ToxicPanda Malware Targets Bank Users smartphone malware concept. 3d render.
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

ToxicPanda Malware Targets Bank Users

FHN November 6, 2024
Recent research has identified a new Android malware strain, initially mistaken for TgToxic, now called ToxicPanda. Although...
Read More Read more about ToxicPanda Malware Targets Bank Users
Threat Actor Leaks Alleged Nokia Source Code image-111
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Threat Actor Leaks Alleged Nokia Source Code

FHN November 5, 2024
The threat actor known as IntelBroker, along with EnergyWeaponUser, has claimed responsibility for a major data breach...
Read More Read more about Threat Actor Leaks Alleged Nokia Source Code
ClickFix Malware Targets GMeet, Zoom Pages Google-Meet-775x436
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

ClickFix Malware Targets GMeet, Zoom Pages

FHN November 5, 2024
The “ClickFix” tactic exploits fake Google Meet and Zoom pages to deliver advanced malware, mimicking legitimate video...
Read More Read more about ClickFix Malware Targets GMeet, Zoom Pages
Hackers Bypass Endpoints with EDRSandBlast Cybersecurity and data privacy protection concept, lock, binary digits background
  • Security Update
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Security Advisory

Hackers Bypass Endpoints with EDRSandBlast

FHN November 5, 2024
Palo Alto Networks’ Unit 42 recently found that hackers are using AV and EDR bypass tools from...
Read More Read more about Hackers Bypass Endpoints with EDRSandBlast
Spectre Flaw Persists in AMD, Intel CPUs 130910REDMackieChip
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Spectre Flaw Persists in AMD, Intel CPUs

FHN November 4, 2024
Researchers have shown an exploit for the Spectre Flaw, targeting the Indirect Branch Predictor Barrier (IBPB) vulnerability....
Read More Read more about Spectre Flaw Persists in AMD, Intel CPUs
SYS01 InfoStealer Malware Targets Meta Business Page 1695755668151
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

SYS01 InfoStealer Malware Targets Meta Business Page

FHN November 4, 2024
The Meta malvertising campaign, active for over a month, spreads SYS01 InfoStealer by disguising it within ElectronJs...
Read More Read more about SYS01 InfoStealer Malware Targets Meta Business Page
Evasive Panda Targets Cloud Services with New Toolkit to Steal Data cloudscout-evasive-panda-cloud-eset-research
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Evasive Panda Targets Cloud Services with New Toolkit to Steal Data

FHN November 4, 2024
Evasive Panda deployed a new C# tool, CloudScout, in early 2023 to target a Taiwanese government entity....
Read More Read more about Evasive Panda Targets Cloud Services with New Toolkit to Steal Data
Critical Chrome Security Vulnerabilities Fixed images (8)
  • google
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Critical Chrome Security Vulnerabilities Fixed

FHN October 30, 2024
Google has released a Chrome update addressing critical vulnerabilities, safeguarding millions of users. The latest Stable version,...
Read More Read more about Critical Chrome Security Vulnerabilities Fixed
Hackers Exploit SonicWall VPNs with Fog Ransomware Kritieke-SonicOS-kwetsbaarheid-heeft-invloed-op-SonicWall-Firewall-apparaten
  • Ransomware
  • BOTNET
  • Compromised
  • Internet Security
  • Security Advisory
  • Security Update

Hackers Exploit SonicWall VPNs with Fog Ransomware

FHN October 29, 2024
Recent cyberattacks by Akira and Fog threat actors have targeted multiple industries by exploiting a vulnerability (CVE-2024-40766)...
Read More Read more about Hackers Exploit SonicWall VPNs with Fog Ransomware
WrnRAT Delivered as Gambling Games malware
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

WrnRAT Delivered as Gambling Games

FHN October 29, 2024
WrnRAT is a new malware that cybercriminals deploy by disguising it as popular gambling games like Badugi,...
Read More Read more about WrnRAT Delivered as Gambling Games
Realtek SD Card Driver Flaw Impacts Laptops sdcards03-7f6cf4e7c9854142be3c8e58e314d69c
  • vulnerability
  • Compromised
  • Internet Security
  • Security Advisory
  • Security Update

Realtek SD Card Driver Flaw Impacts Laptops

FHN October 28, 2024
Multiple vulnerabilities in the Realtek SD card reader driver, RtsPer.sys, affect laptops from major brands like Dell...
Read More Read more about Realtek SD Card Driver Flaw Impacts Laptops
Critical Authentication Flaw in WhatsUp Gold Exposes Organizations to Attack 6370743
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Critical Authentication Flaw in WhatsUp Gold Exposes Organizations to Attack

FHN October 28, 2024
WhatsUp Gold, a popular network monitoring tool, has a critical vulnerability in versions before 2024.0.0, exposing organizations...
Read More Read more about Critical Authentication Flaw in WhatsUp Gold Exposes Organizations to Attack
Cisco ASA SSH Flaw Leaves Devices Vulnerable cisco
  • cisco
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Cisco ASA SSH Flaw Leaves Devices Vulnerable

FHN October 25, 2024
Cisco issued a critical advisory for a vulnerability in its Adaptive Security Appliance (ASA) Software that could...
Read More Read more about Cisco ASA SSH Flaw Leaves Devices Vulnerable
Roundcube Webmail Vulnerability Exploited in Attacks vulnerability
  • vulnerability
  • Exploitation
  • Security Advisory
  • Security Update

Roundcube Webmail Vulnerability Exploited in Attacks

FHN October 25, 2024
Stored XSS vulnerability in Roundcube Webmail is exploited in attacks on ex-USSR government agencies. Researchers identified the...
Read More Read more about Roundcube Webmail Vulnerability Exploited in Attacks
GitLab Patches Critical HTML Injection Flaw Allowing XSS Attacks GitLab
  • vulnerability
  • BOTNET
  • Compromised
  • Internet Security
  • Security Advisory
  • Security Update

GitLab Patches Critical HTML Injection Flaw Allowing XSS Attacks

FHN October 24, 2024
GitLab released patches (17.5.1, 17.4.3, and 17.3.6) for both Community and Enterprise Editions, fixing a critical HTML...
Read More Read more about GitLab Patches Critical HTML Injection Flaw Allowing XSS Attacks
Lazarus APT Hackers Exploit Chrome Zero-Day via Crypto Game Kaspersky-Lab-Lazarus-Logo
  • Security Update
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Zero Day Attack

Lazarus APT Hackers Exploit Chrome Zero-Day via Crypto Game

FHN October 23, 2024
Lazarus APT exploited a Chrome zero-day using a crypto-themed game as bait, showcasing the group’s evolving financial...
Read More Read more about Lazarus APT Hackers Exploit Chrome Zero-Day via Crypto Game
Critical Vulnerabilities Found in VMware vCenter Server vCenter
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Critical Vulnerabilities Found in VMware vCenter Server

FHN October 22, 2024
Broadcom has issued critical security updates for severe vulnerabilities in VMware vCenter Server that allow remote code...
Read More Read more about Critical Vulnerabilities Found in VMware vCenter Server
Callback Phishing Targets Login Credentials via Google Groups 1681884126418
  • phishing
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Security Advisory
  • Security Update

Callback Phishing Targets Login Credentials via Google Groups

FHN October 22, 2024
Phishing attacks trick individuals into revealing sensitive info by impersonating trusted entities, often through urgent emails with...
Read More Read more about Callback Phishing Targets Login Credentials via Google Groups
Over 10 million personal and corporate devices hit by information stealers Digital data security padlock on futuristic circuit board
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Over 10 million personal and corporate devices hit by information stealers

FHN October 22, 2024
Kaspersky reports nearly 10 million personal and corporate devices were compromised by data-stealing malware in 2023, a...
Read More Read more about Over 10 million personal and corporate devices hit by information stealers
GHOSTPULSE Malware Leverages PNG Pixel Structure for Evasion malware
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

GHOSTPULSE Malware Leverages PNG Pixel Structure for Evasion

FHN October 21, 2024
PNG files are popular and widely used on the internet, making them a tempting target for threat...
Read More Read more about GHOSTPULSE Malware Leverages PNG Pixel Structure for Evasion
Hackers Impersonate ESET to Distribute Wiper Malware 00
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers Impersonate ESET to Distribute Wiper Malware

FHN October 21, 2024
Hackers posed as ESET to spread wiper malware via phishing emails starting October 8, 2024. The emails,...
Read More Read more about Hackers Impersonate ESET to Distribute Wiper Malware
Hackers use Bumblebee malware to infiltrate corporate networks 1708047755320
  • Malware
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Hackers use Bumblebee malware to infiltrate corporate networks

FHN October 21, 2024
Bumblebee malware has reemerged, threatening corporate networks globally, following its first sighting since Europol’s May 2024 Operation...
Read More Read more about Hackers use Bumblebee malware to infiltrate corporate networks
Hackers Reportedly Selling Stolen Data from Cisco CISA-Urges-Patching-of-Cisco-ASA-Flaw-Exploited-in-Ransomware-Attacks
  • cisco
  • Internet Security
  • Security Advisory
  • Security Update

Hackers Reportedly Selling Stolen Data from Cisco

FHN October 15, 2024
A group of hackers reportedly sells sensitive data stolen from Cisco, allegedly by IntelBroker in collaboration with...
Read More Read more about Hackers Reportedly Selling Stolen Data from Cisco
ErrorFather hackers remotely attack and control Android devices 1652981388202
  • Malware
  • Android malware
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

ErrorFather hackers remotely attack and control Android devices

FHN October 15, 2024
The ErrorFather campaign, a new variant of the Cerberus banking trojan, emerged in September 2024. It uses...
Read More Read more about ErrorFather hackers remotely attack and control Android devices
PureLogs, a low-cost infostealer, is targeting Chrome browsers exjZtnyH8bykMKrG4TDthC-1200-80
  • infostealer
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • Tips

PureLogs, a low-cost infostealer, is targeting Chrome browsers

FHN October 14, 2024
Infostealer malware, like the recently identified PureLogs, poses significant risks due to its low cost and ease...
Read More Read more about PureLogs, a low-cost infostealer, is targeting Chrome browsers
Hackers exploited a zero-day vulnerability in Qualcomm chips, targeting Android users Qchip
  • Android malware
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Hackers exploited a zero-day vulnerability in Qualcomm chips, targeting Android users

FHN October 14, 2024
Hackers exploit a zero-day vulnerability (CVE-2024-43047) in Qualcomm chipsets, risking millions of Android users globally. The flaw...
Read More Read more about Hackers exploited a zero-day vulnerability in Qualcomm chips, targeting Android users
Foxit PDF Reader vulnerability allows attackers to execute arbitrary code images (1)
  • Arbitrary Code Execution
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Foxit PDF Reader vulnerability allows attackers to execute arbitrary code

FHN October 11, 2024
Researchers revealed six new vulnerabilities, including a critical one in Foxit PDF Reader that allows arbitrary code...
Read More Read more about Foxit PDF Reader vulnerability allows attackers to execute arbitrary code
Mozilla warns of a Firefox zero-day vulnerability actively exploited in cyberattacks firefox-mozilla
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Mozilla warns of a Firefox zero-day vulnerability actively exploited in cyberattacks

FHN October 10, 2024
A critical use-after-free vulnerability in Firefox and Firefox Extended Support Release (ESR) is being actively exploited in...
Read More Read more about Mozilla warns of a Firefox zero-day vulnerability actively exploited in cyberattacks
CISA warns of active exploitation of Microsoft zero-day vulnerabilities 1697532115020
  • Exploitation
  • Microsoft
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

CISA warns of active exploitation of Microsoft zero-day vulnerabilities

FHN October 9, 2024
CISA warns of two critical Microsoft zero-day vulnerabilities, CVE-2024-43572 and CVE-2024-43573, actively exploited in the wild. CVE-2024-43572...
Read More Read more about CISA warns of active exploitation of Microsoft zero-day vulnerabilities
Hackers breached the president’s account of a Japanese aerospace company hero-image.fill.size_1200x675
  • Tips
  • Internet Security
  • Security Advisory
  • Security Update

Hackers breached the president’s account of a Japanese aerospace company

FHN October 9, 2024
Hackers infiltrated JAXA, compromising top officials’ accounts, including President Hiroshi Yamakawa, in a series of cyberattacks since...
Read More Read more about Hackers breached the president’s account of a Japanese aerospace company
LemonDuck malware targets Windows servers by exploiting SMB vulnerabilities images (7)
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

LemonDuck malware targets Windows servers by exploiting SMB vulnerabilities

FHN October 8, 2024
Attackers used the EternalBlue vulnerability to access the observatory farm, create a hidden admin share, and run...
Read More Read more about LemonDuck malware targets Windows servers by exploiting SMB vulnerabilities
Cacti vulnerability allows attackers to execute remote code cacti-logo-_services_india
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Cacti vulnerability allows attackers to execute remote code

FHN October 8, 2024
A critical vulnerability in the Cacti network monitoring tool, discovered in version 1.2.28, could allow attackers to...
Read More Read more about Cacti vulnerability allows attackers to execute remote code
CVE-2024-30052: RCE vulnerability in Visual Studio via dump files Vulnerability-Management-in-Projekten
  • vulnerability
  • Internet Security
  • RCE Flaw
  • Security Advisory
  • Security Update
  • Tips

CVE-2024-30052: RCE vulnerability in Visual Studio via dump files

FHN October 7, 2024
A researcher identified a method to exploit Visual Studio by executing arbitrary code during the debugging of...
Read More Read more about CVE-2024-30052: RCE vulnerability in Visual Studio via dump files
WarmCookie malware spreads via fake update campaign in France cookies-supercookies
  • malicious cyber actors
  • Backdoor
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

WarmCookie malware spreads via fake update campaign in France

FHN October 4, 2024
FakeUpdate, a fake browser update scam, is now targeting users in France, aiming to deploy the WarmCookie...
Read More Read more about WarmCookie malware spreads via fake update campaign in France
Perfctl malware targets millions of Linux servers 4df2346ff72793b08163ca192630a245-320-80
  • malicious cyber actors
  • Linux Malware
  • Malware
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Perfctl malware targets millions of Linux servers

FHN October 4, 2024
Perfctl, a stealthy malware, is actively targeting millions of Linux servers worldwide. Discovered by Aqua Nautilus researchers,...
Read More Read more about Perfctl malware targets millions of Linux servers
Arc Browser Launches Bug Bounty Program After RCE Vulnerability l45020240922172358
  • RCE Flaw
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Arc Browser Launches Bug Bounty Program After RCE Vulnerability

FHN October 4, 2024
The Browser Company has launched a Bug Bounty Program for its Arc Browser after quickly resolving a...
Read More Read more about Arc Browser Launches Bug Bounty Program After RCE Vulnerability
Chrome vulnerabilities enable attackers to run arbitrary code google-chrome-logo-2015_story
  • vulnerability
  • Arbitrary Code Execution
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Chrome vulnerabilities enable attackers to run arbitrary code

FHN October 3, 2024
Google released a Chrome update fixing critical vulnerabilities that could allow arbitrary code execution. Version 129.0.6668.89/.90 is...
Read More Read more about Chrome vulnerabilities enable attackers to run arbitrary code
New XWorm variant spreads via Windows script files media_1841626b913bbf76d0cce4848eb6726d02a02e41b
  • Malware
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • windows

New XWorm variant spreads via Windows script files

FHN October 2, 2024
XWorm is a malware known for its obfuscation techniques and ability to evade detection, posing a significant...
Read More Read more about New XWorm variant spreads via Windows script files
Hackers targeting Docker Swarm, Kubernetes, and SSH servers in large-scale attacks Programming and password concept
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

Hackers targeting Docker Swarm, Kubernetes, and SSH servers in large-scale attacks

FHN October 2, 2024
Hackers are exploiting Docker Swarm, Kubernetes, and SSH servers, targeting Docker API vulnerabilities as the entry point...
Read More Read more about Hackers targeting Docker Swarm, Kubernetes, and SSH servers in large-scale attacks
Linux CUPS has multiple vulnerabilities that allow remote code execution Root lInux
  • Linux Malware
  • BOTNET
  • Exploitation
  • Internet Security
  • Malware
  • RCE Flaw
  • Remote code execution
  • Security Advisory
  • Security Update
  • vulnerability

Linux CUPS has multiple vulnerabilities that allow remote code execution

FHN October 1, 2024
Developers of the Linux printing system CUPS recently disclosed several vulnerabilities that could allow attackers to execute...
Read More Read more about Linux CUPS has multiple vulnerabilities that allow remote code execution
GorillaBot reigns as DDoS king with 300,000+ commands unnamed (2)
  • DDOS
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

GorillaBot reigns as DDoS king with 300,000+ commands

FHN October 1, 2024
The newly emerged Gorilla Botnet has launched over 300,000 DDoS attacks across 100+ countries from September 4...
Read More Read more about GorillaBot reigns as DDoS king with 300,000+ commands
North Korean Hackers Tried to Steal Military Data North-Korean-Hackers
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

North Korean Hackers Tried to Steal Military Data

FHN September 30, 2024
Diehl Defence anti-aircraft missiles are successfully intercepting Russian attacks on Kyiv, with a 100% hit rate. Germany...
Read More Read more about North Korean Hackers Tried to Steal Military Data
HTML smuggling enables hackers to deliver convincing phishing attacks 66352ac9cf9fd8029b1678ec_1 - 3.05-min
  • phishing
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • Spam

HTML smuggling enables hackers to deliver convincing phishing attacks

FHN September 27, 2024
Phishing attackers used an HTML smuggling technique to deliver malware. The attack began with a phishing email...
Read More Read more about HTML smuggling enables hackers to deliver convincing phishing attacks
NIST Recommends New Password Security Rules password
  • Security Update
  • Internet Security
  • Security Advisory
  • Tips

NIST Recommends New Password Security Rules

FHN September 27, 2024
NIST released new password security guidelines in Special Publication 800-63B, improving cybersecurity and user experience. One of...
Read More Read more about NIST Recommends New Password Security Rules
Watch out for fake “verify you’re human” prompts that can deliver malware 0966614ae31a0518
  • Malware
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • Spam

Watch out for fake “verify you’re human” prompts that can deliver malware

FHN September 26, 2024
CAPTCHAs, or Completely Automated Public Turing tests, are used online to verify users are human, not bots....
Read More Read more about Watch out for fake “verify you’re human” prompts that can deliver malware
TeamViewer Privilege Escalation Vulnerability scammers-microsoft-team-gifs-phishing-attacks
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

TeamViewer Privilege Escalation Vulnerability

FHN September 26, 2024
A critical vulnerability in TeamViewer’s Windows Remote client, CVE-2024-7479 and CVE-2024-7481, allows attackers to elevate privileges on...
Read More Read more about TeamViewer Privilege Escalation Vulnerability
Google Warns of North Korean IT Workers Infiltrating U.S. Workforce Digital data security padlock with binary code
  • google
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Google Warns of North Korean IT Workers Infiltrating U.S. Workforce

FHN September 26, 2024
Recently, Google alerted organizations about North Korean IT workers acting on behalf of hackers. Organizations today face...
Read More Read more about Google Warns of North Korean IT Workers Infiltrating U.S. Workforce
0-day flaws in Automated Tank Gauge systems threaten critical infrastructure. Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

0-day flaws in Automated Tank Gauge systems threaten critical infrastructure.

FHN September 26, 2024
Researchers at BitSight TRACE found multiple 0-day vulnerabilities in ATG systems used to manage fuel storage tanks,...
Read More Read more about 0-day flaws in Automated Tank Gauge systems threaten critical infrastructure.
Cisco Smart Licensing Vulnerability Allows Attackers to Control Devices smart-licensing
  • cisco
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Cisco Smart Licensing Vulnerability Allows Attackers to Control Devices

FHN September 25, 2024
Cisco revealed a critical vulnerability, CVE-2024-20439, in its Smart Licensing Utility, allowing unauthorized access due to a...
Read More Read more about Cisco Smart Licensing Vulnerability Allows Attackers to Control Devices
macOS Sequoia update disrupts multiple security tools Screenshot-2024-09-20-at-7-compressed-1
  • MacOS
  • Internet Security
  • Security Advisory
  • Security Update

macOS Sequoia update disrupts multiple security tools

FHN September 24, 2024
Apple’s macOS 15 Sequoia update has broken several key security tools, sparking user frustration across social media...
Read More Read more about macOS Sequoia update disrupts multiple security tools
Fake CAPTCHA sites install Lumma Stealer malware sddefault
  • Malware
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • Tips

Fake CAPTCHA sites install Lumma Stealer malware

FHN September 23, 2024
A new malware campaign is gaining traction online, using fake CAPTCHA sites to trick users into installing...
Read More Read more about Fake CAPTCHA sites install Lumma Stealer malware
Disney to End Use of Slack After Hack Exposes Company Data 1726844633_Disney-GettyImages-2147729848
  • Security Advisory
  • Compromised
  • Exploitation
  • Security Update

Disney to End Use of Slack After Hack Exposes Company Data

FHN September 23, 2024
The Walt Disney Company will stop using Slack for internal communication following a hack that leaked over...
Read More Read more about Disney to End Use of Slack After Hack Exposes Company Data
MediaTek Wi-Fi Zero-Click RCE Vulnerability MediaTek-Chip-Flaw-Exposing-Millions-of-Devices-Gets-Public-Exploit
  • vulnerability
  • RCE Flaw
  • Security Advisory
  • Security Update
  • Zero Day Attack

MediaTek Wi-Fi Zero-Click RCE Vulnerability

FHN September 23, 2024
A critical 0-click RCE vulnerability (CVE-2024-20017) in MediaTek Wi-Fi 6 chipsets, used by devices like Ubiquiti, Xiaomi,...
Read More Read more about MediaTek Wi-Fi Zero-Click RCE Vulnerability
Hacker stole data from Federal Bank customers hacking-2
  • BOTNET
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Hacker stole data from Federal Bank customers

FHN September 20, 2024
A threat actor has allegedly claimed a breach of Federal Bank, exposing sensitive data of hundreds of...
Read More Read more about Hacker stole data from Federal Bank customers
New macOS malware allows attackers to control devices remotely LONDON, UK - MAY 15th 2017: Apple security issues. Silhouette of a hand holding a padlock infront of the apple logo
  • Tips
  • BOTNET
  • Compromised
  • Internet Security
  • MacOS
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

New macOS malware allows attackers to control devices remotely

FHN September 20, 2024
HZ RAT, a remote access trojan (RAT) that has targeted Windows devices since 2020, has recently been...
Read More Read more about New macOS malware allows attackers to control devices remotely
Threat actors claim to have compromised Dell’s employee database rCxSRSLD7geGfsca5jWNn5
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • Tips

Threat actors claim to have compromised Dell’s employee database

FHN September 20, 2024
A hacking group has claimed responsibility for breaching the Dell employee database, asserting access to sensitive information...
Read More Read more about Threat actors claim to have compromised Dell’s employee database
CISA Issues Six Advisories for Industrial Control Systems 8299824b-c9c1-4ea0-9dbd-d61e1ff6b0e2
  • Security Advisory
  • Internet Security
  • Security Update
  • Tips
  • vulnerability

CISA Issues Six Advisories for Industrial Control Systems

FHN September 20, 2024
CISA has issued six advisories highlighting vulnerabilities in various industrial control systems. The advisories cover: These advisories...
Read More Read more about CISA Issues Six Advisories for Industrial Control Systems
Researchers Uncover Raptor Train Botnet with 60,000+ Devices Botnet
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Researchers Uncover Raptor Train Botnet with 60,000+ Devices

FHN September 20, 2024
Researchers discovered a large Chinese state-sponsored IoT botnet, “Raptor Train,” which compromised over 200,000 SOHO and IoT...
Read More Read more about Researchers Uncover Raptor Train Botnet with 60,000+ Devices
Threat Actor Claims to Be Selling Bharat Petroleum Database mise-en-garde-contre-le-cybersecurite
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update

Threat Actor Claims to Be Selling Bharat Petroleum Database

FHN September 18, 2024
A threat actor is reportedly selling a database from Bharat Petroleum Corporation Limited (BPCL). DarkWebInformer first reported...
Read More Read more about Threat Actor Claims to Be Selling Bharat Petroleum Database
Scams and Fake Websites during Amazon Prime Day 1721105446_prime-day
  • Tips
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Spam

Scams and Fake Websites during Amazon Prime Day

FHN September 18, 2024
Amazon Prime Day scams refer to fraudulent schemes that exploit the retailer’s sell-off day. While the event...
Read More Read more about Scams and Fake Websites during Amazon Prime Day
Apple releases iOS 18, fixing 32 security vulnerabilities unnamed
  • Apple
  • Security Advisory
  • Security Update

Apple releases iOS 18, fixing 32 security vulnerabilities

FHN September 18, 2024
Apple has released iOS 18, fixing 32 security vulnerabilities. The update is available for iPhone XS and...
Read More Read more about Apple releases iOS 18, fixing 32 security vulnerabilities
North Korean hackers spread RustDoor Malware on LinkedIn Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

North Korean hackers spread RustDoor Malware on LinkedIn

FHN September 17, 2024
North Korean hackers are targeting LinkedIn users with advanced malware called RustDoor. This highlights the growing use...
Read More Read more about North Korean hackers spread RustDoor Malware on LinkedIn
Hackers leverage Selenium Grid for malicious activity Digital data security padlock with binary code
  • Tips
  • Evilproxy
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers leverage Selenium Grid for malicious activity

FHN September 17, 2024
Threat actors are exploiting Selenium Grid’s default lack of authentication in two active campaigns, deploying exploit kits,...
Read More Read more about Hackers leverage Selenium Grid for malicious activity
Critical Vulnerabilities Impact Millions of D-Link Routers — Patch Now! Critical-RCE-Flaws-in-D-Link-Routers-Wont-Be-Getting-a-Patch
  • vulnerability
  • Arbitrary Code Execution
  • Security Advisory
  • Security Update

Critical Vulnerabilities Impact Millions of D-Link Routers — Patch Now!

FHN September 16, 2024
Millions of D-Link routers are vulnerable to critical security flaws. Urgent firmware updates have been released, and...
Read More Read more about Critical Vulnerabilities Impact Millions of D-Link Routers — Patch Now!
Windows MSHTML zero-day actively exploited images (4)
  • windows
  • BOTNET
  • Exploitation
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Windows MSHTML zero-day actively exploited

FHN September 16, 2024
Adobe’s September 2024 updates fixed 28 vulnerabilities, including a critical ColdFusion flaw (CVSS 9.8). Other affected products...
Read More Read more about Windows MSHTML zero-day actively exploited
Apache Patches Critical OFBiz RCE Vulnerability image_870x_66b1fdc80ab8b
  • BOTNET
  • Compromised
  • Exploitation
  • RCE Flaw
  • Security Advisory
  • Security Update
  • vulnerability

Apache Patches Critical OFBiz RCE Vulnerability

FHN September 13, 2024
Hackers are exploiting a critical Apache OFBiz vulnerability (CVE-2024-45195) that allows unauthenticated remote code execution, threatening organizations...
Read More Read more about Apache Patches Critical OFBiz RCE Vulnerability
Kali Linux 2024.3 Launches with New Hacking Tools 877x440-Images-for-the-News-posts-16
  • Security Update
  • Security Advisory
  • Tips

Kali Linux 2024.3 Launches with New Hacking Tools

FHN September 13, 2024
Kali Linux 2024.3, the latest version of Offensive Security’s Debian-based distribution for ethical hacking, has been released....
Read More Read more about Kali Linux 2024.3 Launches with New Hacking Tools
New Loki Backdoor Targets macOS Systems backdoor-malware
  • Backdoor
  • Internet Security
  • MacOS
  • Malware
  • Security Advisory
  • Security Update

New Loki Backdoor Targets macOS Systems

FHN September 12, 2024
Cody Thomas created Apfell in 2018, an open-source macOS post-exploitation framework that later evolved into Mythic, a...
Read More Read more about New Loki Backdoor Targets macOS Systems
New Android Spyware Posing as TV Streaming App Steals Data 1_icjRMDIItCWnStcw38MmKQ
  • Android malware
  • Malware
  • Security Advisory
  • Security Update
  • spyware

New Android Spyware Posing as TV Streaming App Steals Data

FHN September 12, 2024
Recent research has uncovered new Android Spyware targeting mnemonic keys, vital for cryptocurrency wallet recovery. Disguised as...
Read More Read more about New Android Spyware Posing as TV Streaming App Steals Data
CosmicBeetle Targets SMBs Worldwide Using Old Vulnerabilities warning-cybersecurity-types-of-cyber-attacks
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

CosmicBeetle Targets SMBs Worldwide Using Old Vulnerabilities

FHN September 11, 2024
Hackers target SMBs because they often have weaker security and lack cybersecurity awareness. Without regular security audits...
Read More Read more about CosmicBeetle Targets SMBs Worldwide Using Old Vulnerabilities
Zyxel NAS Devices Prone to Command Injection Attacks 13987-zyxel-releases-patch-for-critical-firewall-os-command-injection-vulnerability
  • BOTNET
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Zyxel NAS Devices Prone to Command Injection Attacks

FHN September 10, 2024
Zyxel released critical hotfixes to fix a command injection vulnerability in two of its NAS products, NAS326...
Read More Read more about Zyxel NAS Devices Prone to Command Injection Attacks
Hackers Exploit GeoServer RCE to Deploy Malware CISA-Warns-of-Actively-Exploited-RCE-Flaw-in-GeoServer-GeoTools-Software
  • BOTNET
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Hackers Exploit GeoServer RCE to Deploy Malware

FHN September 10, 2024
Cybersecurity researchers at Fortinet recently discovered that hackers have been exploiting GeoServer RCE vulnerability to deploy malware,...
Read More Read more about Hackers Exploit GeoServer RCE to Deploy Malware
Vulnerabilities in IBM WebSphere Integration Server could let attackers execute commands. images (3)
  • vulnerability
  • Tips

Vulnerabilities in IBM WebSphere Integration Server could let attackers execute commands.

FHN September 9, 2024
Critical vulnerabilities have been found that could let attackers execute commands on systems. These issues, listed in...
Read More Read more about Vulnerabilities in IBM WebSphere Integration Server could let attackers execute commands.
Akira Ransomware Targets SonicWall Firewall RCE Flaw sonicwall-banner2
  • Ransomware
  • RCE Flaw
  • Security Advisory
  • Security Update
  • vulnerability

Akira Ransomware Targets SonicWall Firewall RCE Flaw

FHN September 9, 2024
SonicWall revealed a critical RCE vulnerability (CVE-2024-40766) in SonicOS on August 22, 2024. Initially, no exploitation was...
Read More Read more about Akira Ransomware Targets SonicWall Firewall RCE Flaw
Predator Spyware leverages “one-click” and “zero-click” exploits image-108
  • spyware
  • Exploitation
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Predator Spyware leverages “one-click” and “zero-click” exploits

FHN September 6, 2024
Recent research shows Predator spyware has resurfaced with improved evasion techniques, despite US sanctions. It’s still active...
Read More Read more about Predator Spyware leverages “one-click” and “zero-click” exploits
Tor Browser 13.5.3 Released: What’s New? tor-browser
  • Security Advisory
  • Security Update
  • Tips

Tor Browser 13.5.3 Released: What’s New?

FHN September 5, 2024
The Tor Project has released Tor Browser 13.5.3, featuring important security updates and usability improvements. You can...
Read More Read more about Tor Browser 13.5.3 Released: What’s New?
Lazarus Hackers Targeting Job Seekers with JavaScript Malware Kaspersky-Lab-Lazarus-Logo
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Lazarus Hackers Targeting Job Seekers with JavaScript Malware

FHN September 5, 2024
Lazarus Group, a notorious North Korean-linked hacker group active since 2010, has intensified its attacks in 2024....
Read More Read more about Lazarus Hackers Targeting Job Seekers with JavaScript Malware
ToddyCat APT Exploits SMB and IKEEXT RCE to Deploy ICMP Backdoor BlackCat
  • BOTNET
  • Backdoor
  • Compromised
  • Exploitation
  • Malware
  • Security Advisory
  • Security Update

ToddyCat APT Exploits SMB and IKEEXT RCE to Deploy ICMP Backdoor

FHN September 4, 2024
ToddyCat is an APT group active since December 2020, targeting government and military entities in Europe and...
Read More Read more about ToddyCat APT Exploits SMB and IKEEXT RCE to Deploy ICMP Backdoor
New Emansrepo Malware Targets Windows via HTML Files malware
  • Tips
  • BOTNET
  • Compromised
  • Evilproxy
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

New Emansrepo Malware Targets Windows via HTML Files

FHN September 4, 2024
Emansrepo, a Python infostealer, is spread through phishing emails with fake purchase orders. The attack has evolved,...
Read More Read more about New Emansrepo Malware Targets Windows via HTML Files
RCE Vulnerability in D-Link WAP Allows Remote Access by Attackers images (1)
  • BOTNET
  • Exploitation
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

RCE Vulnerability in D-Link WAP Allows Remote Access by Attackers

FHN September 3, 2024
The D-Link DAP-2310 Wireless Access Point is vulnerable to remote code execution, allowing attackers to gain unauthorized...
Read More Read more about RCE Vulnerability in D-Link WAP Allows Remote Access by Attackers
New ManticoraLoader Malware Targets Citrix Users for Data Theft malware_fire
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • windows

New ManticoraLoader Malware Targets Citrix Users for Data Theft

FHN September 3, 2024
DeadXInject, the group behind AresLoader and AiDLocker ransomware, is now offering ManticoraLoader, a new Malware-as-a-Service (MaaS) targeting...
Read More Read more about New ManticoraLoader Malware Targets Citrix Users for Data Theft
Snake Keylogger Targets Windows via Malicious Excel Files Programming and password concept
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Snake Keylogger Targets Windows via Malicious Excel Files

FHN September 3, 2024
Researchers have identified a sophisticated phishing campaign using a .NET-based Snake Keylogger variant. This attack uses weaponized...
Read More Read more about Snake Keylogger Targets Windows via Malicious Excel Files
Voldemort Hackers Exploit Google Sheets to Target Windows Users Network-Security
  • BOTNET
  • Compromised
  • Exploitation
  • Malware
  • Security Advisory
  • Security Update
  • windows

Voldemort Hackers Exploit Google Sheets to Target Windows Users

FHN August 30, 2024
Proofpoint researchers have uncovered a cyberattack campaign, “Voldemort,” using Google Sheets as a C2 platform. Targeting Windows...
Read More Read more about Voldemort Hackers Exploit Google Sheets to Target Windows Users
AutoIT Malware Steals Gmail Login Credentials Hook-on-ID-card-with-login-credentials
  • Security Update
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory

AutoIT Malware Steals Gmail Login Credentials

FHN August 30, 2024
A malicious AutoIT executable opens Gmail login pages and steals clipboard data, captures keystrokes, and controls system...
Read More Read more about AutoIT Malware Steals Gmail Login Credentials
Watch Out for Fake Palo Alto Tool Spreading Advanced Malware Robot hand pressing virtual button with online security and warning virus malware.AI(artificial intelligence) hand touching warning malware sign on screen laptop.
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Watch Out for Fake Palo Alto Tool Spreading Advanced Malware

FHN August 29, 2024
A sophisticated malware is threatening organizations in the Middle East by disguising itself as the legitimate Palo...
Read More Read more about Watch Out for Fake Palo Alto Tool Spreading Advanced Malware
Critical Vulnerability in Perl Installer Enables Traffic Interception Danger of hack attack
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Critical Vulnerability in Perl Installer Enables Traffic Interception

FHN August 29, 2024
A critical vulnerability in App::cpanminus (cpanm), a popular tool for installing Perl modules, has been identified. Known...
Read More Read more about Critical Vulnerability in Perl Installer Enables Traffic Interception
Research Uncovers Eight Android and iOS Apps Leaking Users’ Sensitive Data nuY9zB5CwYzkEWXHaXHEuN-1200-80
  • BOTNET
  • Android malware
  • Compromised
  • Exploitation
  • Malware
  • Security Advisory
  • Security Update

Research Uncovers Eight Android and iOS Apps Leaking Users’ Sensitive Data

FHN August 29, 2024
The eight Android and iOS apps fail to protect user data by transmitting sensitive information, such as...
Read More Read more about Research Uncovers Eight Android and iOS Apps Leaking Users’ Sensitive Data
EDR Killer Malware Disables Security Tools on Windows Machines Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • windows

EDR Killer Malware Disables Security Tools on Windows Machines

FHN August 28, 2024
Attackers can exploit Windows drivers to bypass security by exploiting vulnerabilities or using stolen signatures to load...
Read More Read more about EDR Killer Malware Disables Security Tools on Windows Machines
Apache Vulnerability Exposed Unix Systems to Data Theft apache-650
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Apache Vulnerability Exposed Unix Systems to Data Theft

FHN August 28, 2024
A recently disclosed vulnerability in the Apache Portable Runtime (APR) library, identified as CVE-2023-49582, could expose sensitive...
Read More Read more about Apache Vulnerability Exposed Unix Systems to Data Theft
Microsoft 365 Flags Image Emails as Malware Concept of sending e-mails
  • Security Advisory
  • Internet Security
  • Malware
  • Microsoft
  • Security Update

Microsoft 365 Flags Image Emails as Malware

FHN August 27, 2024
Microsoft 365 users report emails with images being wrongly flagged as malware and quarantined, identified as Issue...
Read More Read more about Microsoft 365 Flags Image Emails as Malware
Ransomware Hits Patelco Credit Union, Steals Customer and Employee Data Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
  • BOTNET
  • Compromised
  • Exploitation
  • Ransomware
  • Security Advisory
  • Security Update

Ransomware Hits Patelco Credit Union, Steals Customer and Employee Data

FHN August 26, 2024
Patelco Credit Union revealed a ransomware attack compromising member and employee data, raising concerns about security and...
Read More Read more about Ransomware Hits Patelco Credit Union, Steals Customer and Employee Data
BeaverTail Malware Hits Windows Users via Games malware
  • malicious cyber actors
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • windows

BeaverTail Malware Hits Windows Users via Games

FHN August 25, 2024
Researchers discovered a new malware campaign called BeaverTail, targeting job seekers in a North Korean cyber espionage...
Read More Read more about BeaverTail Malware Hits Windows Users via Games
Active Exploitation of Chrome Zero-Day Vulnerability Copy of Untitled Design - 1
  • Zero Day Attack
  • Exploitation
  • google
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Active Exploitation of Chrome Zero-Day Vulnerability

FHN August 23, 2024
Google has released Chrome 128 (128.0.6613.84 for Linux and 128.0.6613.84/.85 for Windows and Mac) to address a...
Read More Read more about Active Exploitation of Chrome Zero-Day Vulnerability
Caution: Malicious Slack Ads Deliver Harmful Payloads WebsiteBlogWhat-is-a-Malicious-Payload-scaled-1
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Security Advisory
  • Security Update

Caution: Malicious Slack Ads Deliver Harmful Payloads

FHN August 23, 2024
Cybercriminals are using Google search ads to distribute malware disguised as legitimate ads for Slack. This advanced...
Read More Read more about Caution: Malicious Slack Ads Deliver Harmful Payloads
Ngate malware steals card funds on Android devices csm_0323_Aufmacher_Android_9174feaa7f
  • Malware
  • Android malware
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • Tips

Ngate malware steals card funds on Android devices

FHN August 22, 2024
ESET researchers recently identified new Android malware called “Ngate” that allows hackers to withdraw money from victims’...
Read More Read more about Ngate malware steals card funds on Android devices
Log4j Vulnerability Exploited Again to Deploy Crypto-Mining Malware Log4Shell
  • Compromised
  • Backdoor
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Log4j Vulnerability Exploited Again to Deploy Crypto-Mining Malware

FHN August 22, 2024
Recent Log4j attacks use obfuscated LDAP requests to execute malicious scripts, establish persistence, and exfiltrate data. Multiple...
Read More Read more about Log4j Vulnerability Exploited Again to Deploy Crypto-Mining Malware
Backdoor in MIFARE Smart Cards Reveals User-Defined Keys MIFARE-Registered-Partner-300x300
  • Security Update
  • Backdoor
  • BOTNET
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory

Backdoor in MIFARE Smart Cards Reveals User-Defined Keys

FHN August 22, 2024
Researchers uncover new attack vectors in MIFARE Classic cards by analyzing the CRYPTO-1 algorithm and vulnerabilities, demonstrating...
Read More Read more about Backdoor in MIFARE Smart Cards Reveals User-Defined Keys
New UULoader Malware Spreads Gh0st RAT and Mimikatz images
  • Malware
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • Tips

New UULoader Malware Spreads Gh0st RAT and Mimikatz

FHN August 21, 2024
UULoader malware delivers payloads like Gh0st RAT and Mimikatz, targeting Korean and Chinese speakers through malicious installers....
Read More Read more about New UULoader Malware Spreads Gh0st RAT and Mimikatz
Dell SupportAssist Vulnerability Enables Privilege Escalation on PCs images
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

Dell SupportAssist Vulnerability Enables Privilege Escalation on PCs

FHN August 21, 2024
A critical security vulnerability affects Dell SupportAssist for Home PCs, specifically in installer version 4.0.3. Dell SupportAssist...
Read More Read more about Dell SupportAssist Vulnerability Enables Privilege Escalation on PCs
Unauthenticated RCE in WordPress Plugin Exposes 100K Sites AdobeStock_509692496_Editorial_Use_Only_50_1_50_1_34
  • RCE Flaw
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability
  • wordpress

Unauthenticated RCE in WordPress Plugin Exposes 100K Sites

FHN August 21, 2024
A critical vulnerability (CVE-2024-5932) in the GiveWP plugin exposes over 100,000 WordPress sites to remote code execution...
Read More Read more about Unauthenticated RCE in WordPress Plugin Exposes 100K Sites
MegaMedusa: A Powerful Web DDoS Tool Used by Hackers Digital data security padlock on futuristic circuit board
  • BOTNET
  • Compromised
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

MegaMedusa: A Powerful Web DDoS Tool Used by Hackers

FHN August 21, 2024
RipperSec, a pro-Palestinian Malaysian hacktivist group that started on Telegram in June 2023, has quickly grown to...
Read More Read more about MegaMedusa: A Powerful Web DDoS Tool Used by Hackers
Urgent: Windows TCP/IP Vulnerability Discovered, Update Now windows-zero-day-downgrade-attack-stp3OtyPTX6FLNBrTuiE3g-wW54hIOyTE2bffcbkN9qhA-1024x576
  • Tips
  • Internet Security
  • Microsoft
  • Security Advisory
  • Security Update
  • vulnerability

Urgent: Windows TCP/IP Vulnerability Discovered, Update Now

FHN August 20, 2024
A critical vulnerability in the Windows TCP/IP stack enables unauthenticated remote code execution (RCE) through specially crafted...
Read More Read more about Urgent: Windows TCP/IP Vulnerability Discovered, Update Now
Vulnerability in Microsoft Apps Let Hackers Spy on Mac Users Malaga,,Spain,-,May,18th,,2020:,Windows,10,Security.,Holding
  • Microsoft
  • MacOS
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Vulnerability in Microsoft Apps Let Hackers Spy on Mac Users

FHN August 20, 2024
A critical vulnerability in Microsoft apps for macOS allowed hackers to surreptitiously spy on Mac users’ activities....
Read More Read more about Vulnerability in Microsoft Apps Let Hackers Spy on Mac Users
New Styx Stealer Targets Users to Steal Login Passwords GVLNM5IXMAAzh6i
  • vulnerability
  • malicious cyber actors
  • Malware
  • Microsoft
  • Security Advisory
  • Security Update
  • Tips

New Styx Stealer Targets Users to Steal Login Passwords

FHN August 20, 2024
A new threat called Styx Stealer has emerged, targeting users by stealing sensitive data like saved passwords,...
Read More Read more about New Styx Stealer Targets Users to Steal Login Passwords
Google Pixel Devices Shipped with Flawed App 1695467291_839719218730.5751-1200x
  • BOTNET
  • Android malware
  • Compromised
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Google Pixel Devices Shipped with Flawed App

FHN August 19, 2024
Recent research revealed a vulnerability in the Android package of many Google Pixel smartphones. Devices shipped globally...
Read More Read more about Google Pixel Devices Shipped with Flawed App
Lazarus Group Exploited Windows Zero-day 0__JcPX0OYV5cA573Q
  • Zero Day Attack
  • Exploitation
  • Malware
  • Security Advisory
  • Security Update
  • windows

Lazarus Group Exploited Windows Zero-day

FHN August 19, 2024
The notorious Lazarus hacker group exploited a zero-day vulnerability in Microsoft Windows, targeting the Ancillary Function Driver...
Read More Read more about Lazarus Group Exploited Windows Zero-day
New Exploit BYOVDLL Bypasses LSASS Protection hero-image.fill.size_1200x675
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

New Exploit BYOVDLL Bypasses LSASS Protection

FHN August 19, 2024
In July 2022, Microsoft patched a PPL bypass flaw, but a new exploit called “BYOVDLL” has been...
Read More Read more about New Exploit BYOVDLL Bypasses LSASS Protection
Malspam Targets AnyDesk and Microsoft Teams Teams
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • Spam

Malspam Targets AnyDesk and Microsoft Teams

FHN August 16, 2024
Cybersecurity researchers have uncovered a sophisticated malspam campaign targeting users via email and phone. Attackers are exploiting...
Read More Read more about Malspam Targets AnyDesk and Microsoft Teams
Ransomware Group Introduces New EDR Killer Tool img-blog-how-does-ransomware-spread-on-a-network
  • Compromised
  • BOTNET
  • Exploitation
  • malicious cyber actors
  • Malware
  • Ransomware

Ransomware Group Introduces New EDR Killer Tool

FHN August 16, 2024
A ransomware group, RansomHub, has introduced EDRKillShifter, a tool designed to disable EDR systems. This advancement highlights...
Read More Read more about Ransomware Group Introduces New EDR Killer Tool
Critical IBM QRadar Flaws Enable Remote Arbitrary Code Execution IBM-QRadar
  • Remote code execution
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Critical IBM QRadar Flaws Enable Remote Arbitrary Code Execution

FHN August 16, 2024
IBM recently revealed critical vulnerabilities in QRadar Suite Software and IBM Cloud Pak for Security. Exploitation of...
Read More Read more about Critical IBM QRadar Flaws Enable Remote Arbitrary Code Execution
0.0.0.0 Day – 18-Year-Old Flaw Bypasses Browser Security Browser-Security
  • Zero Day Attack
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

0.0.0.0 Day – 18-Year-Old Flaw Bypasses Browser Security

FHN August 16, 2024
Threat actors frequently exploit browser flaws to gain unauthorized access and conduct various illicit activities. Recently, Oligo...
Read More Read more about 0.0.0.0 Day – 18-Year-Old Flaw Bypasses Browser Security
Update Now: Critical SAP Auth Bypass and SSRF Vulnerabilities Fixed SAP2
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Update Now: Critical SAP Auth Bypass and SSRF Vulnerabilities Fixed

FHN August 16, 2024
SAP has issued a major security update addressing critical authentication bypass and server-side request forgery vulnerabilities, with...
Read More Read more about Update Now: Critical SAP Auth Bypass and SSRF Vulnerabilities Fixed
1Password macOS Vulnerability Leads to Credentials Leak meta-og-image
  • vulnerability
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

1Password macOS Vulnerability Leads to Credentials Leak

FHN August 16, 2024
A critical vulnerability in 1Password for macOS allows attackers to bypass security measures and access vault items....
Read More Read more about 1Password macOS Vulnerability Leads to Credentials Leak
Apache OFBiz RCE Vulnerability Found, Patch Immediately vulnerability
  • Tips
  • Security Advisory
  • Security Update
  • vulnerability

Apache OFBiz RCE Vulnerability Found, Patch Immediately

FHN August 6, 2024
A vulnerability, CVE-2024-38856, has been found in Apache OFBiz, allowing unauthenticated remote code execution. A patch is...
Read More Read more about Apache OFBiz RCE Vulnerability Found, Patch Immediately
Beware: Fake AI Editor Stealing Logins 1520154139938
  • BOTNET
  • Compromised
  • Exploitation
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • Spam

Beware: Fake AI Editor Stealing Logins

FHN August 5, 2024
Recently, Trend Micro researchers uncovered a sophisticated malvertising campaign targeting social media users with a multi-step deception...
Read More Read more about Beware: Fake AI Editor Stealing Logins
New Spyware Targeting Android Users hack
  • Malware
  • Android malware
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • Tips

New Spyware Targeting Android Users

FHN August 5, 2024
Cybersecurity experts have uncovered sophisticated Android spyware, LianSpy, targeting users to steal sensitive data. It uses advanced...
Read More Read more about New Spyware Targeting Android Users
Russia-linked APT used a car ad to phish diplomats with Headlace malware. 7-types-of-malware-min-1024x576
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Russia-linked APT used a car ad to phish diplomats with Headlace malware.

FHN August 5, 2024
A Russia-linked threat actor used a car ad to phish diplomats and deliver the HeadLace backdoor, likely...
Read More Read more about Russia-linked APT used a car ad to phish diplomats with Headlace malware.
Critical Flaw in Voice Over Wi-Fi Allows Eavesdropping wifi
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

Critical Flaw in Voice Over Wi-Fi Allows Eavesdropping

FHN August 5, 2024
Voice Over Wi-Fi (VoWiFi) is commonly used for making voice calls over Wi-Fi, improving call quality and...
Read More Read more about Critical Flaw in Voice Over Wi-Fi Allows Eavesdropping
Ubiquiti G4 Vulnerability Discovered, Enabling DDoS Attacks Vulnerability-Management-in-Projekten
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

Ubiquiti G4 Vulnerability Discovered, Enabling DDoS Attacks

FHN August 5, 2024
Researchers found a flaw in Ubiquiti G4 Wi-Fi cameras that exposes critical data. They believe a similar...
Read More Read more about Ubiquiti G4 Vulnerability Discovered, Enabling DDoS Attacks
Hackers Exploit WordPress Plugin File Upload Flaw wordpress0-1060x424-1
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

Hackers Exploit WordPress Plugin File Upload Flaw

FHN August 2, 2024
Hackers are exploiting a critical vulnerability (CVE-2024-6220) in the WordPress plugin 简数采集器 (Keydatas) that allows unauthenticated users...
Read More Read more about Hackers Exploit WordPress Plugin File Upload Flaw
Microsoft Patches Critical Edge Flaw Enabling Code Execution Microsoft-Edge-Logo-chamada
  • BOTNET
  • Exploitation
  • Internet Security
  • Microsoft
  • Security Advisory
  • Security Update
  • vulnerability

Microsoft Patches Critical Edge Flaw Enabling Code Execution

FHN August 2, 2024
Microsoft has patched critical vulnerabilities in Edge. Users should update to the latest version to ensure security....
Read More Read more about Microsoft Patches Critical Edge Flaw Enabling Code Execution
Hackers Exploiting GeoServer RCE Flaw, 6,635 Servers at Risk Network-Security
  • vulnerability
  • Exploitation
  • Internet Security
  • RCE Flaw
  • Security Advisory
  • Security Update
  • Tips

Hackers Exploiting GeoServer RCE Flaw, 6,635 Servers at Risk

FHN August 1, 2024
A critical flaw in GeoServer, an open-source Java software, exposes thousands of servers to risk. The vulnerability,...
Read More Read more about Hackers Exploiting GeoServer RCE Flaw, 6,635 Servers at Risk
Phishing Campaign Exploited Proofpoint for Email Spoofing phishing_2_Main
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

Phishing Campaign Exploited Proofpoint for Email Spoofing

FHN August 1, 2024
Guardio Labs recently identified “EchoSpoofing,” a critical vulnerability in Proofpoint’s email protection service used by 87% of...
Read More Read more about Phishing Campaign Exploited Proofpoint for Email Spoofing
New Specula Tool Turns Outlook into a C2 Server via Registry Exploit Un5CRWVYRDC769ZrkZKAjn
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

New Specula Tool Turns Outlook into a C2 Server via Registry Exploit

FHN July 31, 2024
Cybersecurity firm TrustedSec has introduced a new tool named Specula, which leverages a longstanding vulnerability in Microsoft...
Read More Read more about New Specula Tool Turns Outlook into a C2 Server via Registry Exploit
Microsoft 365 and Azure Outage Disrupts Multiple Services Microsoft-Image-Microsoft
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Microsoft 365 and Azure Outage Disrupts Multiple Services

FHN July 31, 2024
Microsoft is investigating a global outage affecting access to some Microsoft 365 and Azure services. Microsoft 365...
Read More Read more about Microsoft 365 and Azure Outage Disrupts Multiple Services
Chinese Users Targeted by Gh0st RAT Malware Through Fake Chrome Page images (1)
  • Malware
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Security Advisory
  • Security Update

Chinese Users Targeted by Gh0st RAT Malware Through Fake Chrome Page

FHN July 30, 2024
Attackers are using Gh0stGambit to spread Gh0st RAT malware to Chinese users via a fake Google Chrome...
Read More Read more about Chinese Users Targeted by Gh0st RAT Malware Through Fake Chrome Page
Progress Patches New Privilege Escalation Flaw in MOVEit File Transfer moveit-transfer-under-attack-zero-day-vulnerability-actively-being-exploited
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Progress Patches New Privilege Escalation Flaw in MOVEit File Transfer

FHN July 30, 2024
Progress, the company behind MOVEit Transfer, has issued a critical security alert for a newly discovered vulnerability...
Read More Read more about Progress Patches New Privilege Escalation Flaw in MOVEit File Transfer
Malicious Python Package Targets macOS Developers for Google Cloud Login Theft 1_xKUZNRoE-lACVL7aMIEIKQ
  • BOTNET
  • Compromised
  • cyberattack
  • Exploitation
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

Malicious Python Package Targets macOS Developers for Google Cloud Login Theft

FHN July 29, 2024
Hackers exploit malicious Python packages to attack developer environments, inject harmful code, and steal sensitive information or...
Read More Read more about Malicious Python Package Targets macOS Developers for Google Cloud Login Theft
RaspAP Vulnerability Allows Hackers to Gain Privileges on Raspberry Pi Devices VRTBlog-min-1
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

RaspAP Vulnerability Allows Hackers to Gain Privileges on Raspberry Pi Devices

FHN July 29, 2024
A critical local privilege escalation vulnerability (CVE-2024-41637) was found in RaspAP, an open-source project for turning Raspberry...
Read More Read more about RaspAP Vulnerability Allows Hackers to Gain Privileges on Raspberry Pi Devices
Phishing Attack Hits Indian Mobile Users via India Post Scams 360_F_500669410_zgsbeas0cJ0OsguE7P45Wdjt7cNR2Usy
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

Phishing Attack Hits Indian Mobile Users via India Post Scams

FHN July 26, 2024
Indian iPhone users are inundated with SMS phishing scams posing as India Post delivery notifications, aimed at...
Read More Read more about Phishing Attack Hits Indian Mobile Users via India Post Scams
Threat Actors Claim Leak of 250M IOC Data; CrowdStrike Responds Programming and password concept
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update

Threat Actors Claim Leak of 250M IOC Data; CrowdStrike Responds

FHN July 26, 2024
The hacktivist group USDoD claims to have leaked CrowdStrike’s “entire threat actor list” and an “entire IOC...
Read More Read more about Threat Actors Claim Leak of 250M IOC Data; CrowdStrike Responds
Google Chrome Issues Warnings for Malicious Downloads 1618490397_google-chrome-v90
  • google
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Google Chrome Issues Warnings for Malicious Downloads

FHN July 25, 2024
Google Chrome now has a new download system with alerts for potentially harmful files, enhancing user security....
Read More Read more about Google Chrome Issues Warnings for Malicious Downloads
Jellyfish Loader Malware Discovered, Poses Threat to 2024 Olympics hero-image.fill.size_1200x675
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Jellyfish Loader Malware Discovered, Poses Threat to 2024 Olympics

FHN July 24, 2024
A new threat, Jellyfish Loader, has been identified as a .NET-based shellcode downloader disguised as a Windows...
Read More Read more about Jellyfish Loader Malware Discovered, Poses Threat to 2024 Olympics
Alert: Krampus Loader Gaining Popularity on the Dark Web cyber-attack (1)
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Alert: Krampus Loader Gaining Popularity on the Dark Web

FHN July 24, 2024
“Krampus,” a new malware loader, is gaining popularity on the dark web, according to MonThreat on X...
Read More Read more about Alert: Krampus Loader Gaining Popularity on the Dark Web
Watch Out for Malicious Python Packages That Steal Sensitive Data python
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update

Watch Out for Malicious Python Packages That Steal Sensitive Data

FHN July 24, 2024
Malicious Python packages uploaded by “dsfsdfds” to PyPI stole sensitive data from user systems and sent it...
Read More Read more about Watch Out for Malicious Python Packages That Steal Sensitive Data
Attackers Exploit Swap File to Steal Credit Card Information hacking-2
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Attackers Exploit Swap File to Steal Credit Card Information

FHN July 23, 2024
Researchers at Sucuri recently discovered that website swap files can be exploited to install a persistent credit...
Read More Read more about Attackers Exploit Swap File to Steal Credit Card Information
Flaw in Cisco VPN routers enables remote code execution by attackers cisco-brand-logo-white-gradient-background-1024x576
  • vulnerability
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update

Flaw in Cisco VPN routers enables remote code execution by attackers

FHN July 23, 2024
Cisco disclosed a significant flaw in the upload module of RV340 and RV345 VPN routers, allowing remote,...
Read More Read more about Flaw in Cisco VPN routers enables remote code execution by attackers
Watch out for fake browser updates installing malicious BOINC software. caution sign data unlocking hackers
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Watch out for fake browser updates installing malicious BOINC software.

FHN July 22, 2024
Since July 4, 2024, SocGholish (FakeUpdates) has shown new behavior. The infection chain starts with a compromised...
Read More Read more about Watch out for fake browser updates installing malicious BOINC software.
SonicOS IPSec VPN Vulnerability Allows Attackers to Cause DoS Condition istockphoto-1345224671-612x612
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • Tips

SonicOS IPSec VPN Vulnerability Allows Attackers to Cause DoS Condition

FHN July 22, 2024
SonicWall has disclosed a critical heap-based buffer overflow vulnerability in SonicOS IPSec VPN, identified as CVE-2024-40764, which...
Read More Read more about SonicOS IPSec VPN Vulnerability Allows Attackers to Cause DoS Condition
BadPack Malware for Android Infects APK Installers 1650884176_960_Android-How-to-install-or-remove-APK-file
  • Tips
  • Android malware
  • BOTNET
  • Compromised
  • Malware

BadPack Malware for Android Infects APK Installers

FHN July 21, 2024
New research reveals a novel approach to hiding malware in APK installers. Adversaries manipulate the file header...
Read More Read more about BadPack Malware for Android Infects APK Installers
Hackers Claim Dettol Data Breach Affects 453,646 Users 1608193113506
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Hackers Claim Dettol Data Breach Affects 453,646 Users

FHN July 19, 2024
Threat actor ‘Hana’ claims to have breached Dettol India, affecting 453,646 users, according to a FalconFeedsio post...
Read More Read more about Hackers Claim Dettol Data Breach Affects 453,646 Users
CrowdStrike Update Leads to Widespread Windows BSOD Crashes crowdstrikedisruption
  • Security Advisory
  • Internet Security
  • Security Update
  • windows

CrowdStrike Update Leads to Widespread Windows BSOD Crashes

FHN July 19, 2024
A recent CrowdStrike update has caused widespread Blue Screen of Death (BSOD) errors on Windows machines. The...
Read More Read more about CrowdStrike Update Leads to Widespread Windows BSOD Crashes
New TE.0 HTTP Request Smuggling Vulnerability Affects Google Cloud Websites Vulnerabilities and Exploits
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

New TE.0 HTTP Request Smuggling Vulnerability Affects Google Cloud Websites

FHN July 18, 2024
HTTP Request Smuggling exploits differences in how web servers and intermediaries handle HTTP request sequences. Attackers craft...
Read More Read more about New TE.0 HTTP Request Smuggling Vulnerability Affects Google Cloud Websites
ShadowRoot Ransomware Targets Businesses with Weaponized PDFs 1_fA6hTUP_hha-ku4GSQlRtw
  • Ransomware
  • Security Advisory
  • Security Update
  • Tips

ShadowRoot Ransomware Targets Businesses with Weaponized PDFs

FHN July 17, 2024
X-Labs identified ransomware targeting Turkish businesses through PDF attachments in emails from the internet[.]ru domain. These PDFs...
Read More Read more about ShadowRoot Ransomware Targets Businesses with Weaponized PDFs
Poco RAT uses 7zip files via Google Drive for attacks 1676273760862
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Poco RAT uses 7zip files via Google Drive for attacks

FHN July 17, 2024
In early 2024, Cofense researchers discovered Poco RAT, a malware specifically targeting Spanish-speaking individuals in the mining...
Read More Read more about Poco RAT uses 7zip files via Google Drive for attacks
HardBit Ransomware Evades Detection with Passphrase Protection 1652088426353
  • Tips
  • Ransomware
  • Security Advisory
  • Security Update

HardBit Ransomware Evades Detection with Passphrase Protection

FHN July 17, 2024
In 2022, HardBit Ransomware 4.0 emerged, differing from typical groups by avoiding leak sites and double extortion....
Read More Read more about HardBit Ransomware Evades Detection with Passphrase Protection
Pinterest Data Leak: Hackers Claim Access to 60M Records pinterest-green-queen
  • BOTNET
  • Exploitation
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • Tips

Pinterest Data Leak: Hackers Claim Access to 60M Records

FHN July 15, 2024
Pinterest, with over 518 million users, faces a potential data leak. Hacker “Tchao1337” claims to have leaked...
Read More Read more about Pinterest Data Leak: Hackers Claim Access to 60M Records
Juniper Junos Flaw Allows Full ‘Root’ Access to Attackers New-Juniper-Junos-OS-Flaws-Expose-Devices-to-Remote-Attacks--Patch-Now
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

Juniper Junos Flaw Allows Full ‘Root’ Access to Attackers

FHN July 15, 2024
Hackers target Juniper Junos due to its extensive use in business networking, making it a prime target...
Read More Read more about Juniper Junos Flaw Allows Full ‘Root’ Access to Attackers
FishXProxy amplifies phishing attacks with cunning and deceptive tactics fishxproxy
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

FishXProxy amplifies phishing attacks with cunning and deceptive tactics

FHN July 12, 2024
Imagine receiving an email that appears completely legitimate. This is the deceptive capability of the new FishXProxy...
Read More Read more about FishXProxy amplifies phishing attacks with cunning and deceptive tactics
Hackers Using ClickFix Tactics to Deploy Malware 7-types-of-malware-min-1024x576
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers Using ClickFix Tactics to Deploy Malware

FHN July 12, 2024
McAfee Labs researchers have identified a sophisticated malware delivery method, “ClickFix,” using advanced social engineering to trick...
Read More Read more about Hackers Using ClickFix Tactics to Deploy Malware
Microsoft Patches 3 Critical Vulnerabilities in July Update Microsoft-January-Patch-Tuesday-e1560707746266
  • BOTNET
  • Compromised
  • Exploitation
  • Microsoft
  • Security Advisory
  • Security Update

Microsoft Patches 3 Critical Vulnerabilities in July Update

FHN July 11, 2024
Microsoft’s July security update addresses 142 vulnerabilities, including one already being exploited. This update is part of...
Read More Read more about Microsoft Patches 3 Critical Vulnerabilities in July Update
Chinese APT40 Exploits New Vulnerabilities Within Hours China-Zero-Days
  • vulnerability
  • Security Advisory
  • Security Update
  • Tips

Chinese APT40 Exploits New Vulnerabilities Within Hours

FHN July 10, 2024
International cybersecurity agencies have issued a warning about APT40, a PRC state-sponsored cyber group linked to the...
Read More Read more about Chinese APT40 Exploits New Vulnerabilities Within Hours
Eldorado Ransomware Targets Windows and Linux Systems Ransomware red button on keyboard, 3D rendering
  • BOTNET
  • Compromised
  • Exploitation
  • Linux Malware
  • Malware
  • Ransomware
  • Security Advisory
  • Security Update
  • windows

Eldorado Ransomware Targets Windows and Linux Systems

FHN July 10, 2024
Ransomware-as-a-service (RaaS) has evolved into a sophisticated, enterprise-like model. From 2022 to 2023, ransomware ads on the...
Read More Read more about Eldorado Ransomware Targets Windows and Linux Systems
Jenkins Script Console used for cryptocurrency mining attacks by hackers Computer hacker and Bitcoin cryptocurrency
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Security Advisory
  • Security Update

Jenkins Script Console used for cryptocurrency mining attacks by hackers

FHN July 9, 2024
Researchers discovered that attackers can exploit improperly configured Jenkins Script Console for criminal activities like cryptocurrency mining....
Read More Read more about Jenkins Script Console used for cryptocurrency mining attacks by hackers
Ghostscript Rendering Platform Flaw Enables Remote Code Execution GSB5wZbbEAAt5PO
  • vulnerability
  • RCE Flaw
  • Security Advisory
  • Security Update

Ghostscript Rendering Platform Flaw Enables Remote Code Execution

FHN July 9, 2024
A critical vulnerability, CVE-2024-29510, has been discovered in the Ghostscript rendering platform. This format string flaw affects...
Read More Read more about Ghostscript Rendering Platform Flaw Enables Remote Code Execution
Info-Stealing Malware Posing as Accessibility Tools and Chrome Extensions 1701328826685
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Info-Stealing Malware Posing as Accessibility Tools and Chrome Extensions

FHN July 8, 2024
The first half of 2024 has witnessed a notable surge in info-stealing malware masquerading as AI tools...
Read More Read more about Info-Stealing Malware Posing as Accessibility Tools and Chrome Extensions
Orcinius Trojan Targets Users Through Dropbox & Google Docs devsecops-t
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Orcinius Trojan Targets Users Through Dropbox & Google Docs

FHN July 8, 2024
A new multi-stage trojan, “Orcinius,” exploits Dropbox and Google Docs. It starts with an Excel spreadsheet containing...
Read More Read more about Orcinius Trojan Targets Users Through Dropbox & Google Docs
ScreenConnect Remote Access Client Exploited by Hackers to Deploy AsyncRAT caution sign data unlocking hackers
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update

ScreenConnect Remote Access Client Exploited by Hackers to Deploy AsyncRAT

FHN July 5, 2024
eSentire’s Threat Response Unit (TRU) has uncovered a sophisticated campaign in which threat actors exploit the ScreenConnect...
Read More Read more about ScreenConnect Remote Access Client Exploited by Hackers to Deploy AsyncRAT
Hackers Exploit Twilio API to Verify MFA Phone Numbers 877x440-Images-for-the-News-posts
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Hackers Exploit Twilio API to Verify MFA Phone Numbers

FHN July 5, 2024
A vulnerability in an unauthenticated endpoint allowed threat actors to identify phone numbers associated with Authy accounts....
Read More Read more about Hackers Exploit Twilio API to Verify MFA Phone Numbers
FakeBat Malware Targets AnyDesk, Zoom, Teams & Chrome 1711975385898
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

FakeBat Malware Targets AnyDesk, Zoom, Teams & Chrome

FHN July 4, 2024
Hackers are targeting and weaponizing AnyDesk, Zoom, Teams, and Chrome due to their widespread use across multiple...
Read More Read more about FakeBat Malware Targets AnyDesk, Zoom, Teams & Chrome
RegreSSHion OpenSSH Vulnerability Enables RCE vulnerability
  • BOTNET
  • Compromised
  • Exploitation
  • RCE Flaw
  • Security Advisory
  • Security Update
  • vulnerability

RegreSSHion OpenSSH Vulnerability Enables RCE

FHN July 4, 2024
A newly discovered OpenSSH vulnerability, dubbed regreSSHion, allows remote attackers to gain root privileges on Linux systems...
Read More Read more about RegreSSHion OpenSSH Vulnerability Enables RCE
CapraRAT Mimics Popular Apps to Attack Android Users android-malware
  • BOTNET
  • Android malware
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

CapraRAT Mimics Popular Apps to Attack Android Users

FHN July 3, 2024
Transparent Tribe (aka APT36), active since 2016, uses social engineering to target Indian government and military personnel....
Read More Read more about CapraRAT Mimics Popular Apps to Attack Android Users
Google Offers $250,000 for Full VM Escape Zero-Day Vulnerability Google-Launches-New-Open-Source-Bug-Bounty-to-Tackle-Supply
  • Zero Day Attack
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Google Offers $250,000 for Full VM Escape Zero-Day Vulnerability

FHN July 3, 2024
Google has launched kvmCTF, a new vulnerability reward program targeting the Kernel-based Virtual Machine (KVM) hypervisor. Announced...
Read More Read more about Google Offers $250,000 for Full VM Escape Zero-Day Vulnerability
Malware Spreading via Binance Smart Contracts Blockchain binance_logo3.jpg-min2-min
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Malware Spreading via Binance Smart Contracts Blockchain

FHN July 2, 2024
Cybercriminals are exploiting Binance smart contracts as intermediary C2 servers, favoring them due to their resilience against...
Read More Read more about Malware Spreading via Binance Smart Contracts Blockchain
New GrimResource Attack Technique Exploits MMC and DLL Flaw images
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

New GrimResource Attack Technique Exploits MMC and DLL Flaw

FHN July 2, 2024
A new malicious code execution technique, GrimResource, targets Microsoft Management Console. Attackers exploit an old cross-site scripting...
Read More Read more about New GrimResource Attack Technique Exploits MMC and DLL Flaw
Critical OpenSSH Flaw Puts Millions of Linux Servers at Risk linux-bug
  • vulnerability
  • Internet Security
  • Linux Malware
  • Security Advisory
  • Security Update

Critical OpenSSH Flaw Puts Millions of Linux Servers at Risk

FHN July 1, 2024
A critical vulnerability in OpenSSH, affecting versions 8.5p1 to 9.7p1, has been discovered, potentially exposing millions of...
Read More Read more about Critical OpenSSH Flaw Puts Millions of Linux Servers at Risk
Beware of the “TRANSLATEXT” Chrome Extension from North Korean Hackers 1701328826685
  • Tips
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Beware of the “TRANSLATEXT” Chrome Extension from North Korean Hackers

FHN July 1, 2024
Hackers exploit Chrome extensions to embed malware, gather personal data, display pop-ups, change URLs, and manipulate the...
Read More Read more about Beware of the “TRANSLATEXT” Chrome Extension from North Korean Hackers
Xeno RAT is actively targeting users via GitHub repositories and .gg domains. emergent-threat-banner-1-1
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Xeno RAT is actively targeting users via GitHub repositories and .gg domains.

FHN June 27, 2024
Threat actors leverage RATs for sustained access to compromised systems, facilitating prolonged espionage and exploitation. North Korean...
Read More Read more about Xeno RAT is actively targeting users via GitHub repositories and .gg domains.
PoC Released for SQL Injection in Fortra FileCatalyst Vulnerabilities and Exploits
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • Tips

PoC Released for SQL Injection in Fortra FileCatalyst

FHN June 27, 2024
A PoC exploit for the SQL Injection vulnerability CVE-2024-5276 in Fortra FileCatalyst Workflow has been released, affecting...
Read More Read more about PoC Released for SQL Injection in Fortra FileCatalyst
Critical Vulnerability in MOVEit Transfer Allowed Hackers to Access Files 1695761855521 (1)
  • vulnerability
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Critical Vulnerability in MOVEit Transfer Allowed Hackers to Access Files

FHN June 26, 2024
A critical vulnerability, CVE-2024-5806, in MOVEit Transfer software poses severe risks to organizations relying on it for...
Read More Read more about Critical Vulnerability in MOVEit Transfer Allowed Hackers to Access Files
Threat Actor Claims Zero-Day Sandbox Escape and RCE in Chrome Browser news-about-google-chrome-zero-day-vulnerability_en
  • Zero Day Attack
  • google
  • Internet Security
  • Security Advisory
  • Security Update

Threat Actor Claims Zero-Day Sandbox Escape and RCE in Chrome Browser

FHN June 26, 2024
A threat actor has publicly claimed a zero-day vulnerability in the widely-used Google Chrome browser. The account...
Read More Read more about Threat Actor Claims Zero-Day Sandbox Escape and RCE in Chrome Browser
Linux LPE Zero-Day Exploit via GRUB Bootloader best-ways-to-improve-the-security-of-your-linux-os-3-1024x688
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Linux LPE Zero-Day Exploit via GRUB Bootloader

FHN June 25, 2024
A new threat actor has surfaced, claiming a zero-day vulnerability in the Linux GRUB bootloader for local...
Read More Read more about Linux LPE Zero-Day Exploit via GRUB Bootloader
SneakyChef and SugarGhost, newly identified RAT malware strains Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • windows

SneakyChef and SugarGhost, newly identified RAT malware strains

FHN June 24, 2024
Talos Intelligence has uncovered a sophisticated cyber campaign orchestrated by the threat actor SneakyChef. This operation utilizes...
Read More Read more about SneakyChef and SugarGhost, newly identified RAT malware strains
Microsoft Power BI Vulnerability Exposes Organizations’ Sensitive Data Thumbnail-What-is-Sensitive-Data-Exposure-Vulnerability-how-to-avoid-it
  • Microsoft
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Microsoft Power BI Vulnerability Exposes Organizations’ Sensitive Data

FHN June 24, 2024
A Microsoft Power BI vulnerability allows unauthorized access to sensitive data in reports, affecting tens of thousands...
Read More Read more about Microsoft Power BI Vulnerability Exposes Organizations’ Sensitive Data
New Linux Variant of RansomHub Targets ESXi Systems rise-of-ransomware
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update

New Linux Variant of RansomHub Targets ESXi Systems

FHN June 21, 2024
Hackers frequently target ESXi systems due to their extensive use in managing enterprise virtualized infrastructure, making them...
Read More Read more about New Linux Variant of RansomHub Targets ESXi Systems
New Security Flaw Enables Access to Microsoft Corporate Email Accounts email-hacks
  • Compromised
  • Exploitation
  • Microsoft
  • Security Advisory
  • Security Update

New Security Flaw Enables Access to Microsoft Corporate Email Accounts

FHN June 21, 2024
A new security flaw allows attackers to impersonate Microsoft corporate email accounts, increasing phishing risks. Discovered by...
Read More Read more about New Security Flaw Enables Access to Microsoft Corporate Email Accounts
Hackers Use Progressive Web Apps to Steal Passwords DIGI_21_Blog_Password Phishing_BlogPromo_660x371
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update

Hackers Use Progressive Web Apps to Steal Passwords

FHN June 20, 2024
Hackers are increasingly exploiting Progressive Web Apps (PWAs) for sophisticated phishing attacks to steal user credentials, as...
Read More Read more about Hackers Use Progressive Web Apps to Steal Passwords
Hackers Use Windows Installer (MSI) Files to Spread Malware alerta_malware
  • Malware
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Hackers Use Windows Installer (MSI) Files to Spread Malware

FHN June 19, 2024
Cybersecurity researchers have uncovered a sophisticated malware campaign by the Void Arachne group, targeting Chinese-speaking users with...
Read More Read more about Hackers Use Windows Installer (MSI) Files to Spread Malware
Chrome Security Update: Fixes for Six Vulnerabilities news-about-google-chrome-zero-day-vulnerability_en
  • google
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Chrome Security Update: Fixes for Six Vulnerabilities

FHN June 19, 2024
Google has released a new Chrome browser update, version 126.0.6478.114/115 for Windows and Mac, and 126.0.6478.114 for...
Read More Read more about Chrome Security Update: Fixes for Six Vulnerabilities
Hackers are using new techniques to target Docker API Programming and password concept
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips

Hackers are using new techniques to target Docker API

FHN June 18, 2024
The Spinning YARN attackers have initiated a fresh cryptojacking campaign, focusing on publicly exposed Docker Engine hosts....
Read More Read more about Hackers are using new techniques to target Docker API
Hidden Backdoor in D-Link Routers Lets Attackers Log in as Admin waPmOQfw4v2d9NDuEpim
  • Tips
  • Backdoor
  • BOTNET
  • Compromised
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Hidden Backdoor in D-Link Routers Lets Attackers Log in as Admin

FHN June 18, 2024
A critical vulnerability in several D-Link wireless router models allows unauthenticated attackers to gain administrative access. The...
Read More Read more about Hidden Backdoor in D-Link Routers Lets Attackers Log in as Admin
Lumma Stealer Spreads Through Fake Browser Updates Using ClearFake Cybersecurity and secure nerwork concept. Data protection, gdrp. Glowing futuristic backround with lock on digital integrated circuit.
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Lumma Stealer Spreads Through Fake Browser Updates Using ClearFake

FHN June 17, 2024
Recent research uncovered websites deploying Lumma Stealer disguised as browser updates. These sites, posing as tutorial pages...
Read More Read more about Lumma Stealer Spreads Through Fake Browser Updates Using ClearFake
Microsoft Patches Critical MSMQ Flaw Microsoft-January-Patch-Tuesday-e1560707746266
  • BOTNET
  • Exploitation
  • Microsoft
  • vulnerability

Microsoft Patches Critical MSMQ Flaw

FHN June 14, 2024
On Patch Tuesday, June 11, 2024, Microsoft fixed numerous flaws, including a remote code execution vulnerability in...
Read More Read more about Microsoft Patches Critical MSMQ Flaw
Beware: WARMCOOKIE Backdoor Knocking at Your Inbox backdoor
  • Security Update
  • Backdoor
  • Internet Security
  • Malware
  • Security Advisory

Beware: WARMCOOKIE Backdoor Knocking at Your Inbox

FHN June 14, 2024
WARMCOOKIE is a new Windows backdoor delivered via a phishing campaign called REF6127. It can take screenshots,...
Read More Read more about Beware: WARMCOOKIE Backdoor Knocking at Your Inbox
0-Day Vulnerability in 10,000 Web Apps Exploited with XSS Payloads 64062c342857c332a08594fe_zerodaycover
  • vulnerability
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Zero Day Attack

0-Day Vulnerability in 10,000 Web Apps Exploited with XSS Payloads

FHN June 13, 2024
A significant vulnerability, CVE-2024-37629, has been discovered in SummerNote 0.8.18, allowing Cross-Site Scripting (XSS) via the Code...
Read More Read more about 0-Day Vulnerability in 10,000 Web Apps Exploited with XSS Payloads
Hackers Exploit Linux SSH Services to Deploy Malware New-OpenSSH-Vulnerability-Exposes-Linux-Systems-to-Remote-Command-Injection
  • Tips
  • Internet Security
  • Linux Malware
  • Security Advisory
  • Security Update

Hackers Exploit Linux SSH Services to Deploy Malware

FHN June 12, 2024
SSH and RDP provide remote server access (Linux and Windows respectively) for administration. Both protocols are vulnerable...
Read More Read more about Hackers Exploit Linux SSH Services to Deploy Malware
Critical Flaw in Apple Ecosystems Allows Unauthorized Access security-flaw-1024x576
  • BOTNET
  • Apple
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Critical Flaw in Apple Ecosystems Allows Unauthorized Access

FHN June 12, 2024
Hackers target Apple due to its large user base and wealthy customers, including business people and managers...
Read More Read more about Critical Flaw in Apple Ecosystems Allows Unauthorized Access
SSLoad Malware Utilizes MSI Installer to Initiate Delivery Chain gettyimages-1443520646
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

SSLoad Malware Utilizes MSI Installer to Initiate Delivery Chain

FHN June 11, 2024
Malware distributors exploit MSI installers because Windows OS inherently trusts them to run with administrative rights, bypassing...
Read More Read more about SSLoad Malware Utilizes MSI Installer to Initiate Delivery Chain
Biometric Terminal Exposed to QR Code SQL Injection Vulnerability Vulnerability-Management-Program-Best-Practices-1
  • BOTNET
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Biometric Terminal Exposed to QR Code SQL Injection Vulnerability

FHN June 11, 2024
A popular ZKTeco biometric terminal has critical vulnerabilities, including an SQL injection flaw via QR codes. This...
Read More Read more about Biometric Terminal Exposed to QR Code SQL Injection Vulnerability
EmailGPT Vulnerability Exposes Sensitive Data to Attackers f09df391-9cdb-43b3-990e-1cc172b75605
  • vulnerability
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

EmailGPT Vulnerability Exposes Sensitive Data to Attackers

FHN June 10, 2024
A new prompt injection vulnerability, CVE-2024-5184, has been found in EmailGPT, the service and Chrome plugin that...
Read More Read more about EmailGPT Vulnerability Exposes Sensitive Data to Attackers
PoC Exploit Released for Veeam Authentication Bypass Flaw 1680448488398
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

PoC Exploit Released for Veeam Authentication Bypass Flaw

FHN June 10, 2024
A PoC exploit has been released for the critical Veeam Backup Enterprise Manager authentication bypass vulnerability, CVE-2024-29849,...
Read More Read more about PoC Exploit Released for Veeam Authentication Bypass Flaw
Muhstik Malware Attacks Apache RocketMQ for Remote Code Execution Malware,Attack,Warning,On,A,Laptop,Screen.,3d,Rendering
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Remote code execution
  • Security Advisory
  • Security Update

Muhstik Malware Attacks Apache RocketMQ for Remote Code Execution

FHN June 7, 2024
Apache RocketMQ, a widely used messaging system for handling high volumes of data and critical operations, often...
Read More Read more about Muhstik Malware Attacks Apache RocketMQ for Remote Code Execution
Fog Ransomware Targets Windows Servers Admins for RDP Logins Arctic-Wolf-Fog-Ransomware
  • Exploitation
  • Internet Security
  • Malware
  • Ransomware
  • Security Advisory
  • Security Update
  • windows

Fog Ransomware Targets Windows Servers Admins for RDP Logins

FHN June 6, 2024
The new ‘Fog’ ransomware targets US education and recreation businesses. Attackers used compromised VPN credentials from two...
Read More Read more about Fog Ransomware Targets Windows Servers Admins for RDP Logins
Cisco Webex Meetings Flaw Enables Unauthorized Access download
  • Tips
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Cisco Webex Meetings Flaw Enables Unauthorized Access

FHN June 6, 2024
Cisco disclosed a major security vulnerability in its Webex Meetings platform, affecting some customers in its Frankfurt...
Read More Read more about Cisco Webex Meetings Flaw Enables Unauthorized Access
Caution: Phishing Emails Urging Execution via Paste (CTRL+V) 40682390390_ce23a349b7_c-1
  • phishing
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Caution: Phishing Emails Urging Execution via Paste (CTRL+V)

FHN June 5, 2024
Phishing attackers distribute email attachments with malicious HTML files designed to exploit users into running the code...
Read More Read more about Caution: Phishing Emails Urging Execution via Paste (CTRL+V)
Security Vulnerability in Zyxel NAS Devices Enables Remote System Takeover zyxel-broken
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Security Vulnerability in Zyxel NAS Devices Enables Remote System Takeover

FHN June 5, 2024
Zyxel has identified and released security patches for critical vulnerabilities affecting their NAS326 and NAS542 devices. These...
Read More Read more about Security Vulnerability in Zyxel NAS Devices Enables Remote System Takeover
Hackers Use Cracked MS Office Versions to Deliver Malware Digital data security padlock with binary code
  • Microsoft
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers Use Cracked MS Office Versions to Deliver Malware

FHN June 3, 2024
In South Korea, attackers distribute malware disguised as cracked software, including RATs and crypto miners, and register...
Read More Read more about Hackers Use Cracked MS Office Versions to Deliver Malware
CarnavalHeist Uses Word Documents to Steal Login Credentials Hook-on-ID-card-with-login-credentials
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

CarnavalHeist Uses Word Documents to Steal Login Credentials

FHN June 3, 2024
Hackers exploit the widespread use and trust of Word documents, easily deceiving users into opening them. These...
Read More Read more about CarnavalHeist Uses Word Documents to Steal Login Credentials
FlyingYeti Uses WinRAR Flaw for Malware Attacks WINRAR-1-e1552918131767
  • Security Update
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory

FlyingYeti Uses WinRAR Flaw for Malware Attacks

FHN May 31, 2024
Since Russia’s invasion of Ukraine on February 24, 2022, tensions have been high globally. Following the invasion,...
Read More Read more about FlyingYeti Uses WinRAR Flaw for Malware Attacks
Citrix Workspace App Lets Attackers Elevate Privileges from User to Root citrix-logo-social-1200x630
  • Citrix
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Citrix Workspace App Lets Attackers Elevate Privileges from User to Root

FHN May 30, 2024
A critical vulnerability in the Citrix Workspace app for Mac, tracked as CVE-2024-5027, could allow attackers to...
Read More Read more about Citrix Workspace App Lets Attackers Elevate Privileges from User to Root
Cybercriminals are Using Microsoft Office Documents to Spread Malware in Business Environments caution sign data unlocking hackers
  • Microsoft
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Cybercriminals are Using Microsoft Office Documents to Spread Malware in Business Environments

FHN May 29, 2024
Microsoft Office provides tools for creating professional reports, college essays, CVs, and notes on Office 365. It...
Read More Read more about Cybercriminals are Using Microsoft Office Documents to Spread Malware in Business Environments
Foxit PDF Reader and Editor Flaw Enables Privilege Escalation foxit_00
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Foxit PDF Reader and Editor Flaw Enables Privilege Escalation

FHN May 29, 2024
A new privilege escalation vulnerability (CVE-2024-29072, severity 8.2 High) has been discovered in multiple versions of Foxit...
Read More Read more about Foxit PDF Reader and Editor Flaw Enables Privilege Escalation
New Embargo Ransomware Discovered, Potential ALPHV Rebirth img-blog-how-does-ransomware-spread-on-a-network
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update

New Embargo Ransomware Discovered, Potential ALPHV Rebirth

FHN May 28, 2024
A new ransomware strain called Embargo, written in Rust, has surfaced with its Darknet infrastructure. Using double...
Read More Read more about New Embargo Ransomware Discovered, Potential ALPHV Rebirth
TP-Link Archer C5400X Router Flaw Allows Remote Hacking warning-cybersecurity-types-of-cyber-attacks
  • vulnerability
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update

TP-Link Archer C5400X Router Flaw Allows Remote Hacking

FHN May 28, 2024
Hackers frequently target routers, the gateways connecting devices and networks to the internet, because they are often...
Read More Read more about TP-Link Archer C5400X Router Flaw Allows Remote Hacking
Hackers Can Exploit Apple’s Wi-Fi Positioning System to Track Users Globally png-clipart-wi-fi-wi-fi-thumbnail
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Hackers Can Exploit Apple’s Wi-Fi Positioning System to Track Users Globally

FHN May 23, 2024
A recent study by University of Maryland security researchers revealed a major privacy vulnerability in Apple’s Wi-Fi...
Read More Read more about Hackers Can Exploit Apple’s Wi-Fi Positioning System to Track Users Globally
PoC Exploit Out for Critical Git RCE Vulnerability ICS-vulnerabilities-cybersecurity-feature-May-9-2022-web
  • RCE Flaw
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

PoC Exploit Out for Critical Git RCE Vulnerability

FHN May 22, 2024
A critical vulnerability in Git, known as CVE-2024-32002, has recently emerged, posing substantial risks to users of...
Read More Read more about PoC Exploit Out for Critical Git RCE Vulnerability
GHOSTENGINE Malware Exploits Drivers to Terminate EDR Agents Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • Malware
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

GHOSTENGINE Malware Exploits Drivers to Terminate EDR Agents

FHN May 22, 2024
Researchers discovered REF4578, an intrusion set that exploits vulnerable drivers to disable EDRs for crypto mining and...
Read More Read more about GHOSTENGINE Malware Exploits Drivers to Terminate EDR Agents
Microsoft Reveals New Windows 11 Features for Enhanced Security MICROSOFT_WINDOWS_11_ANW_01
  • Microsoft
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • windows

Microsoft Reveals New Windows 11 Features for Enhanced Security

FHN May 21, 2024
Microsoft is focusing on security in Windows, introducing Secured-Core PCs against hardware to cloud attacks and expanding...
Read More Read more about Microsoft Reveals New Windows 11 Features for Enhanced Security
Zabbix SQL Injection Vulnerability Leads to Remote Code Execution 201909_Security_SQL-Injection_1
  • BOTNET
  • Compromised
  • Exploitation
  • Remote code execution
  • vulnerability

Zabbix SQL Injection Vulnerability Leads to Remote Code Execution

FHN May 21, 2024
Zabbix, a widely used network monitoring tool in corporate IT infrastructure globally, is susceptible to SQL injection...
Read More Read more about Zabbix SQL Injection Vulnerability Leads to Remote Code Execution
Recent Linux Backdoor Targets Linux Users sddefault
  • BOTNET
  • Compromised
  • Exploitation
  • Linux Malware
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Recent Linux Backdoor Targets Linux Users

FHN May 17, 2024
Recently, cybersecurity researchers at Symantec uncovered a fresh Linux backdoor actively targeting users through installation packages. All...
Read More Read more about Recent Linux Backdoor Targets Linux Users
Apple Safari Zero-Day Flaw Exploited at Pwn2Own: Urgent Patch Required apple-security-hns2
  • Tips
  • Apple
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Zero Day Attack

Apple Safari Zero-Day Flaw Exploited at Pwn2Own: Urgent Patch Required

FHN May 17, 2024
Apple has rolled out security updates to tackle a zero-day vulnerability in its Safari web browser, exploited...
Read More Read more about Apple Safari Zero-Day Flaw Exploited at Pwn2Own: Urgent Patch Required
Wireshark 4.2.5 Release: What’s New! wireshark_medium
  • Tips
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Wireshark 4.2.5 Release: What’s New!

FHN May 17, 2024
Wireshark, the leading network protocol analyzer, has just released version 4.2.5, introducing numerous new features and enhancements....
Read More Read more about Wireshark 4.2.5 Release: What’s New!
Millions of IoT Devices Vulnerable to Attacks, Posing Risk of Full Takeover iot-8685
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Millions of IoT Devices Vulnerable to Attacks, Posing Risk of Full Takeover

FHN May 16, 2024
Researchers have uncovered four significant vulnerabilities in the ThroughTek Kalay Platform, utilized by 100 million IoT-enabled devices....
Read More Read more about Millions of IoT Devices Vulnerable to Attacks, Posing Risk of Full Takeover
New Google Chrome Zero-day Being Exploited in the Wild—Patch Immediately! news-about-google-chrome-zero-day-vulnerability_en
  • google
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Zero Day Attack

New Google Chrome Zero-day Being Exploited in the Wild—Patch Immediately!

FHN May 15, 2024
Google has released a critical security update for its Chrome browser upon uncovering a zero-day vulnerability actively...
Read More Read more about New Google Chrome Zero-day Being Exploited in the Wild—Patch Immediately!
Hackers Utilize Word Files to Distribute DanaBot Malware smartphone malware concept. 3d render.
  • Tips
  • BOTNET
  • Compromised
  • Exploitation
  • Malware
  • Security Advisory
  • Security Update

Hackers Utilize Word Files to Distribute DanaBot Malware

FHN May 15, 2024
Recent email campaigns distribute DanaBot malware through two document types: those exploiting equation editor and those with...
Read More Read more about Hackers Utilize Word Files to Distribute DanaBot Malware
iTunes for Windows Vulnerability Enables Malicious Code Execution itunes-windows-store-icon
  • Apple
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability
  • windows

iTunes for Windows Vulnerability Enables Malicious Code Execution

FHN May 14, 2024
iTunes has an arbitrary code execution vulnerability, potentially enabling attackers to execute malicious code. Apple has issued...
Read More Read more about iTunes for Windows Vulnerability Enables Malicious Code Execution
Proof-of-Concept (PoC) Released for Critical PuTTY Private Key Recovery Vulnerability devsecops-t
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Proof-of-Concept (PoC) Released for Critical PuTTY Private Key Recovery Vulnerability

FHN May 14, 2024
Security researchers have published a Proof-of-Concept (PoC) exploit for a critical vulnerability in the widely used PuTTY...
Read More Read more about Proof-of-Concept (PoC) Released for Critical PuTTY Private Key Recovery Vulnerability
Microsoft Edge Zero-Day Exploit Detected in Live Attacks Microsoft
  • Microsoft
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Microsoft Edge Zero-Day Exploit Detected in Live Attacks

FHN May 13, 2024
A zero-day vulnerability in Microsoft Edge, identified as CVE-2024-4671, has been actively exploited by malicious organizations, as...
Read More Read more about Microsoft Edge Zero-Day Exploit Detected in Live Attacks
Critical Cacti Vulnerability Enables Remote Code Execution by Attackers vulnerability
  • vulnerability
  • malicious cyber actors
  • Remote code execution
  • Security Advisory
  • Security Update

Critical Cacti Vulnerability Enables Remote Code Execution by Attackers

FHN May 13, 2024
Cacti, a widely used network monitoring tool, has released a critical security update addressing various vulnerabilities, notably...
Read More Read more about Critical Cacti Vulnerability Enables Remote Code Execution by Attackers
New F5 Next-Gen Manager Vulnerability Enables Attackers to Obtain Full Admin Control f5 BIG-IP
  • vulnerability
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

New F5 Next-Gen Manager Vulnerability Enables Attackers to Obtain Full Admin Control

FHN May 10, 2024
Two critical vulnerabilities in F5 Next-Gen Big IP have been uncovered, enabling threat actors to attain full...
Read More Read more about New F5 Next-Gen Manager Vulnerability Enables Attackers to Obtain Full Admin Control
Dell Breached: Attackers Acquire Personal Information of 49 Million Customers rCxSRSLD7geGfsca5jWNn5
  • Exploitation
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Dell Breached: Attackers Acquire Personal Information of 49 Million Customers

FHN May 10, 2024
Dell Technologies recently disclosed a data breach involving a company portal containing limited customer information related to...
Read More Read more about Dell Breached: Attackers Acquire Personal Information of 49 Million Customers
CrushFTP vulnerability exploited in the wild to execute remote code images (2)
  • BOTNET
  • Exploitation
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update
  • vulnerability

CrushFTP vulnerability exploited in the wild to execute remote code

FHN May 9, 2024
A critical vulnerability, CVE-2024-4040, has been actively exploited in the wild in CrushFTP. This flaw permits attackers...
Read More Read more about CrushFTP vulnerability exploited in the wild to execute remote code
Cyber attackers use weaponized shortcut files to distribute CHM malware types-of-malware-image
  • malicious cyber actors
  • cyberattack
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Cyber attackers use weaponized shortcut files to distribute CHM malware

FHN May 9, 2024
Hackers exploit weaponized shortcut files because they can execute malicious code without targeting specific users. Given their...
Read More Read more about Cyber attackers use weaponized shortcut files to distribute CHM malware
MorLock Ransomware Targets Organizations, Stealing Business Data Ransomware-Report-Photo
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Ransomware
  • Security Advisory
  • Security Update

MorLock Ransomware Targets Organizations, Stealing Business Data

FHN May 8, 2024
The MorLock ransomware group has escalated its assaults on Russian businesses, resulting in disruptions and financial setbacks....
Read More Read more about MorLock Ransomware Targets Organizations, Stealing Business Data
XSS Vulnerability in Yoast SEO Plugin Endangers Over 5 Million WordPress Websites wordpress-g74a560834_1280
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability
  • wordpress

XSS Vulnerability in Yoast SEO Plugin Endangers Over 5 Million WordPress Websites

FHN May 8, 2024
Security researcher Bassem Essam uncovered a critical cross-site scripting (XSS) vulnerability in the widely-used Yoast SEO WordPress...
Read More Read more about XSS Vulnerability in Yoast SEO Plugin Endangers Over 5 Million WordPress Websites
Trend Micro Antivirus One Allowed Malicious Code Injection by Attackers mqdefault
  • vulnerability
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Trend Micro Antivirus One Allowed Malicious Code Injection by Attackers

FHN May 7, 2024
A major update for Trend Micro’s Antivirus One software has been launched. This update tackles a critical...
Read More Read more about Trend Micro Antivirus One Allowed Malicious Code Injection by Attackers
MITRE Exposes Chinese Hackers’ Employment of ROOTROT Webshell in Network Breach emergent-threat-banner-1-1
  • Tips
  • BOTNET
  • Compromised
  • malicious cyber actors
  • vulnerability

MITRE Exposes Chinese Hackers’ Employment of ROOTROT Webshell in Network Breach

FHN May 7, 2024
The MITRE Corporation, a non-profit organization managing research and development centers for the U.S. government, has revealed...
Read More Read more about MITRE Exposes Chinese Hackers’ Employment of ROOTROT Webshell in Network Breach
A novel Cuckoo malware strain is targeting macOS users 1711975385898
  • Malware
  • Internet Security
  • MacOS
  • malicious cyber actors
  • Security Advisory
  • Security Update

A novel Cuckoo malware strain is targeting macOS users

FHN May 6, 2024
Researchers have unveiled a new malware strain named “Cuckoo,” combining features of spyware and infostealers, designed to...
Read More Read more about A novel Cuckoo malware strain is targeting macOS users
ShadowSyndicate hackers exploit Aiohttp vulnerability for sensitive data theft 1676273760862
  • BOTNET
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

ShadowSyndicate hackers exploit Aiohttp vulnerability for sensitive data theft

FHN May 3, 2024
A directory traversal vulnerability (CVE-2024-23334) in aiohttp versions before 3.9.2 permits remote attackers to access sensitive files...
Read More Read more about ShadowSyndicate hackers exploit Aiohttp vulnerability for sensitive data theft
ArubaOS Critical Vulnerability Allows Remote Code Execution by Attackers Aruba
  • vulnerability
  • hackers
  • malicious cyber actors
  • Malware
  • Remote code execution
  • Security Advisory
  • Security Update

ArubaOS Critical Vulnerability Allows Remote Code Execution by Attackers

FHN May 3, 2024
Multiple vulnerabilities in ArubaOS affect HPE Aruba Networking devices, including Mobility Conductor, Mobility Controllers WLAN Gateways, and...
Read More Read more about ArubaOS Critical Vulnerability Allows Remote Code Execution by Attackers
‘Cuttlefish’ Zero-Click Malware Pilfers Private Cloud Data types-of-malware-image
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

‘Cuttlefish’ Zero-Click Malware Pilfers Private Cloud Data

FHN May 2, 2024
Cuttlefish is a recently discovered malware platform that has been active since at least July 2023. It...
Read More Read more about ‘Cuttlefish’ Zero-Click Malware Pilfers Private Cloud Data
Gemini 1.5 Pro: Your Exclusive New AI Malware Analyst 1712757590562
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Gemini 1.5 Pro: Your Exclusive New AI Malware Analyst

FHN May 1, 2024
Gemini 1.5 Pro represents the latest iteration of the Gemini AI malware analysis platform, poised to revolutionize...
Read More Read more about Gemini 1.5 Pro: Your Exclusive New AI Malware Analyst
New Android Malware Mimics Social Media Apps to Steal Sensitive Data mobile-banking-malware-on-rise-showcase_image-10-a-8764
  • Malware
  • Android malware
  • cyberattack
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • Woody RAT malware

New Android Malware Mimics Social Media Apps to Steal Sensitive Data

FHN May 1, 2024
A new RAT malware targeting Android devices has been discovered, capable of executing additional commands compared to...
Read More Read more about New Android Malware Mimics Social Media Apps to Steal Sensitive Data
Darkgate Malware Utilizes Autohotkey to Track Teams 1701328826685
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Darkgate Malware Utilizes Autohotkey to Track Teams

FHN April 30, 2024
Researchers have discovered a new infection chain linked to the DarkGate malware. This Remote Access Trojan (RAT),...
Read More Read more about Darkgate Malware Utilizes Autohotkey to Track Teams
LightSpy Malware Targets MacOS Devices macoshero
  • Malware
  • Internet Security
  • MacOS
  • malicious cyber actors
  • Security Advisory
  • Security Update

LightSpy Malware Targets MacOS Devices

FHN April 30, 2024
BlackBerry initially reported a new iOS LightSpy malware, but Huntress researchers discovered it as a macOS variant...
Read More Read more about LightSpy Malware Targets MacOS Devices
New Android Trojan executes malicious commands on your phone android-trojan
  • BOTNET
  • Android malware
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

New Android Trojan executes malicious commands on your phone

FHN April 30, 2024
XLab researchers uncover “Wpeeper,” a new Android malware infiltrating systems to execute various malicious commands, posing a...
Read More Read more about New Android Trojan executes malicious commands on your phone
Grafana Tool Vulnerability Enables SQL Injection by Attackers Vulnerabilities and Exploits
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Grafana Tool Vulnerability Enables SQL Injection by Attackers

FHN April 29, 2024
A severe SQL injection vulnerability has been discovered in Grafana, a popular open-source platform extensively used for...
Read More Read more about Grafana Tool Vulnerability Enables SQL Injection by Attackers
PlugX USB Worm Infects Over 2.5 Million Devices shutterstock_1459422656-min
  • BOTNET
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

PlugX USB Worm Infects Over 2.5 Million Devices

FHN April 29, 2024
A new threat has surfaced, impacting millions of devices globally. The PlugX USB worm, a sophisticated malware,...
Read More Read more about PlugX USB Worm Infects Over 2.5 Million Devices
SSLoad Malware Combined with Tools Hijacks Entire Network Domain Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

SSLoad Malware Combined with Tools Hijacks Entire Network Domain

FHN April 26, 2024
The FROZEN#SHADOW attack campaign employs SSLoad malware alongside Cobalt Strike Implants to seize control of the entire...
Read More Read more about SSLoad Malware Combined with Tools Hijacks Entire Network Domain
Cactus Ransomware Exploits Vulnerability in Qlik Servers qlik-1400
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update
  • vulnerability

Cactus Ransomware Exploits Vulnerability in Qlik Servers

FHN April 26, 2024
Since November 2023, the Cactus ransomware gang has been exploiting vulnerable Qlik Sense servers, leveraging multiple vulnerabilities...
Read More Read more about Cactus Ransomware Exploits Vulnerability in Qlik Servers
Hackers exploit Autodesk Drive to host weaponized PDF files autodesk-3
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers exploit Autodesk Drive to host weaponized PDF files

FHN April 26, 2024
Autodesk Drive serves as a cloud-based data-sharing platform for organizations, facilitating document and file sharing. It accommodates...
Read More Read more about Hackers exploit Autodesk Drive to host weaponized PDF files
GuptiMiner Exploits eScan to Distribute Miners and Backdoors 1140-anti-virus-software-laptop
  • BOTNET
  • Compromised
  • Exploitation
  • IOC's
  • malicious cyber actors

GuptiMiner Exploits eScan to Distribute Miners and Backdoors

FHN April 25, 2024
Avast researchers recently uncovered GuptiMiner, an aged malware. It leverages the eScan antivirus update system to surreptitiously...
Read More Read more about GuptiMiner Exploits eScan to Distribute Miners and Backdoors
Urgent: GitLab Flaw Allows Account Takeover – Act Now GitLab
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

Urgent: GitLab Flaw Allows Account Takeover – Act Now

FHN April 25, 2024
GitLab has issued security patches (16.11.1, 16.10.4, and 16.9.6) for both Community and Enterprise Editions, emphasizing the...
Read More Read more about Urgent: GitLab Flaw Allows Account Takeover – Act Now
CrushFTP Zero-Day Enables Attackers to Gain Complete Server Access emergent-threat-banner-1-1
  • Tips
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

CrushFTP Zero-Day Enables Attackers to Gain Complete Server Access

FHN April 24, 2024
CrushFTP disclosed a zero-day vulnerability (CVE-2024-4040) affecting versions below 10.7.1 and 11.1.0, allowing remote attackers with low...
Read More Read more about CrushFTP Zero-Day Enables Attackers to Gain Complete Server Access
OpenMetadata Vulnerabilities to Target Kubernetes 86132257
  • Exploitation
  • Compromised
  • malicious cyber actors
  • Security Advisory
  • Security Update

OpenMetadata Vulnerabilities to Target Kubernetes

FHN April 23, 2024
The OpenMetadata platform has critical vulnerabilities reported by Microsoft Security Blog, enabling attackers to exploit Kubernetes workloads...
Read More Read more about OpenMetadata Vulnerabilities to Target Kubernetes
Critical Oracle VirtualBox vulnerability now has a PoC exploit released 1545873686825
  • Compromised
  • Exploitation
  • Security Advisory
  • Security Update
  • vulnerability

Critical Oracle VirtualBox vulnerability now has a PoC exploit released

FHN April 23, 2024
Oracle VirtualBox had a critical vulnerability (CVE-2024-21111) allowing Privilege Escalation and Arbitrary File Move/Delete, rated 7.8 (High)....
Read More Read more about Critical Oracle VirtualBox vulnerability now has a PoC exploit released
Watch Out for Weaponized Zip Files Distributing WINELOADER Malware malware
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Watch Out for Weaponized Zip Files Distributing WINELOADER Malware

FHN April 22, 2024
Russian threat group APT29 targeted German political parties with a new backdoor, WINELOADER, via spear-phishing emails containing...
Read More Read more about Watch Out for Weaponized Zip Files Distributing WINELOADER Malware
PyPI Package Malware Targets Discord Users for Credential Theft 1_oUNqS-1u3nUXfuPDH6o-2Q
  • Malware
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

PyPI Package Malware Targets Discord Users for Credential Theft

FHN April 22, 2024
Hackers frequently exploit PyPI packages to inject malicious code into widely-used Python libraries, seeking vulnerabilities. Recently, FortiGuard...
Read More Read more about PyPI Package Malware Targets Discord Users for Credential Theft
Cerber Linux Ransomware Targets Atlassian Servers 1701395818046
  • Ransomware
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Cerber Linux Ransomware Targets Atlassian Servers

FHN April 19, 2024
Cybercriminals frequently deploy Linux ransomware in server environments, targeting organizations with critical data for potentially higher payouts....
Read More Read more about Cerber Linux Ransomware Targets Atlassian Servers
Active Directory Security: 5 Critical Vulnerabilities to Monitor azure-active-directory-aad-icon-488x512-3d71nrtk
  • vulnerability
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Active Directory Security: 5 Critical Vulnerabilities to Monitor

FHN April 18, 2024
Microsoft’s Active Directory (AD) acts as the backbone of your organization’s network, regulating access to network and...
Read More Read more about Active Directory Security: 5 Critical Vulnerabilities to Monitor
Tor Browser 13.0: What’s New lead
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Tor Browser 13.0: What’s New

FHN April 17, 2024
Tor Browser 13.0.14 is now available, featuring crucial security enhancements for the widely-used privacy-centric web browser. Tor...
Read More Read more about Tor Browser 13.0: What’s New
Surge in Zero-click Vulnerabilities: The Rise of ‘Mobile NotPetya’ phone-security-and-privacy-600-1
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Surge in Zero-click Vulnerabilities: The Rise of ‘Mobile NotPetya’

FHN April 17, 2024
The cybersecurity community warns of the rising threat of a “mobile NotPetya” event, a self-propagating mobile malware...
Read More Read more about Surge in Zero-click Vulnerabilities: The Rise of ‘Mobile NotPetya’
Hackers Customize LockBit 3.0 Ransomware for Global Organization Attacks 20230131-USECASE-lockbit-1-1024x538
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Ransomware
  • Security Advisory
  • Security Update

Hackers Customize LockBit 3.0 Ransomware for Global Organization Attacks

FHN April 17, 2024
Hackers exploit LockBit 3.0 ransomware for its advanced encryption, successfully locking victims’ files for ransom. Its stealthiness...
Read More Read more about Hackers Customize LockBit 3.0 Ransomware for Global Organization Attacks
Recent SharePoint Method Enables Hackers to Evade Security Measures sharepoint
  • BOTNET
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Recent SharePoint Method Enables Hackers to Evade Security Measures

FHN April 16, 2024
Two recently discovered SharePoint techniques empower malicious actors to circumvent conventional security measures and extract sensitive data...
Read More Read more about Recent SharePoint Method Enables Hackers to Evade Security Measures
LightSpy: Malware Threatening Android and iOS Users YQaVTQE6JAfu6bvPgwmd5U-1200-80
  • Android malware
  • Apple
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

LightSpy: Malware Threatening Android and iOS Users

FHN April 15, 2024
A recently discovered malware dubbed LightSpy has been found to target both Android and iOS users. LightSpy,...
Read More Read more about LightSpy: Malware Threatening Android and iOS Users
Critical PAN-OS Command Injection Vulnerability Exploited palo_alto_networks-logo
  • vulnerability
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Critical PAN-OS Command Injection Vulnerability Exploited

FHN April 15, 2024
Palo Alto Networks alerts customers to a critical command injection vulnerability in PAN-OS GlobalProtect feature, scoring the...
Read More Read more about Critical PAN-OS Command Injection Vulnerability Exploited
Hackers deploy malware-driven scans to uncover vulnerabilities ICS-vulnerabilities-cybersecurity-feature-May-9-2022-web
  • Malware
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Hackers deploy malware-driven scans to uncover vulnerabilities

FHN April 13, 2024
Hackers are employing malware-infected devices for scanning target networks rather than conducting direct scans. This strategy allows...
Read More Read more about Hackers deploy malware-driven scans to uncover vulnerabilities
Critical vulnerabilities in LG TVs enable command execution vulnerability
  • Security Update
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Tips
  • vulnerability

Critical vulnerabilities in LG TVs enable command execution

FHN April 12, 2024
LG has addressed four critical vulnerabilities found in numerous TV models, dating back to 2023, which could...
Read More Read more about Critical vulnerabilities in LG TVs enable command execution
Microsoft’s latest Patch Tuesday addresses 149 security vulnerabilities this-month-s-patch-tuesday-
  • Microsoft
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Microsoft’s latest Patch Tuesday addresses 149 security vulnerabilities

FHN April 11, 2024
On April Patch Tuesday, Microsoft addressed 149 bugs, one of its largest security updates, spanning various products...
Read More Read more about Microsoft’s latest Patch Tuesday addresses 149 security vulnerabilities
XZ Utils Backdoor Uncovered, Poses Threat to Linux Servers backdoor
  • BOTNET
  • Backdoor
  • Compromised
  • Internet Security
  • Linux Malware
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

XZ Utils Backdoor Uncovered, Poses Threat to Linux Servers

FHN April 11, 2024
Andres Freund discovered a backdoor in the liblzma library, part of the XZ data compression tool. The...
Read More Read more about XZ Utils Backdoor Uncovered, Poses Threat to Linux Servers
Attackers Utilize Obfuscation Tools for Multi-Stage Malware Delivery via Invoice Phishing Cyber Security Smart Devices. Cloud Computing Data Breach
  • BOTNET
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update

Attackers Utilize Obfuscation Tools for Multi-Stage Malware Delivery via Invoice Phishing

FHN April 10, 2024
Cybersecurity researchers uncover a complex multi-stage attack employing invoice-themed phishing decoys to distribute various malware, including Venom...
Read More Read more about Attackers Utilize Obfuscation Tools for Multi-Stage Malware Delivery via Invoice Phishing
Two Zero-Day Android Flaws Exploited in Google Pixel Android-Update
  • Tips
  • Android malware
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Zero Day Attack

Two Zero-Day Android Flaws Exploited in Google Pixel

FHN April 10, 2024
Google has revealed the detection of two Android zero-day security vulnerabilities in its Pixel smartphones, with patches...
Read More Read more about Two Zero-Day Android Flaws Exploited in Google Pixel
New E-Shopping Attack: Hijacking Users’ Banking Credentials istockphoto-1050228750-612x612
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

New E-Shopping Attack: Hijacking Users’ Banking Credentials

FHN April 5, 2024
Since 2021, a fake e-shop scam campaign has targeted Southeast Asia, with increased activity observed by CRIL...
Read More Read more about New E-Shopping Attack: Hijacking Users’ Banking Credentials
Critical OS Command Injection Vulnerability Discovered in Progress Flowmon Vulnerabilities and Exploits
  • vulnerability
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Critical OS Command Injection Vulnerability Discovered in Progress Flowmon

FHN April 4, 2024
Progress Flowmon is a network monitoring and security solution developed by Progress, a software company. It is...
Read More Read more about Critical OS Command Injection Vulnerability Discovered in Progress Flowmon
Hackers are exploiting YouTube channels to steal your data szabo-viktor-UfseYCHvIH0-unsplash-scaled
  • BOTNET
  • Compromised
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Hackers are exploiting YouTube channels to steal your data

FHN April 4, 2024
Cybercriminals are exploiting YouTube, a platform adored by millions, to orchestrate advanced malware attacks. These perpetrators, capitalizing...
Read More Read more about Hackers are exploiting YouTube channels to steal your data
StrelaStealer targets users to steal logins from Outlook and Thunderbird shutterstock_1459422656-min
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

StrelaStealer targets users to steal logins from Outlook and Thunderbird

FHN April 3, 2024
A sophisticated variant of StrelaStealer malware, tailored for Spanish-speaking users, is targeting popular email clients Outlook and...
Read More Read more about StrelaStealer targets users to steal logins from Outlook and Thunderbird
Microsoft introduces 5 new AI tools to be integrated with Azure AI. 1_QNhXK6gUVXT-AYBO26fJRg
  • Microsoft
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Microsoft introduces 5 new AI tools to be integrated with Azure AI.

FHN April 2, 2024
Microsoft has rolled out new tools in Azure AI Studio to aid generative AI app developers in...
Read More Read more about Microsoft introduces 5 new AI tools to be integrated with Azure AI.
Patch immediately: Bitdefender Security Privilege Escalation Vulnerability 401092-security-suites-bitdefender-antivirus-for-mac-2020-10012716
  • vulnerability
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Patch immediately: Bitdefender Security Privilege Escalation Vulnerability

FHN April 2, 2024
Bitdefender has patched a vulnerability across its popular products like Internet Security, Antivirus Plus, Total Security, and...
Read More Read more about Patch immediately: Bitdefender Security Privilege Escalation Vulnerability
Microsoft SharePoint vulnerability detected. Update now! unnamed
  • Microsoft
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Microsoft SharePoint vulnerability detected. Update now!

FHN April 1, 2024
In late March 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert concerning the...
Read More Read more about Microsoft SharePoint vulnerability detected. Update now!
iPhone users, beware! Darcula phishing service targeting iMessage Phishing-Attacks-That-Can-Impact-Your-Business-image
  • phishing
  • Apple
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

iPhone users, beware! Darcula phishing service targeting iMessage

FHN April 1, 2024
Recently, cybersecurity analysts at Netcraft uncovered threat actors actively exploiting the Dracula phishing service to target USPS...
Read More Read more about iPhone users, beware! Darcula phishing service targeting iMessage
Wireshark 4.2.4 is now available: What’s New! 1678266601417
  • BOTNET
  • Compromised
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Wireshark 4.2.4 is now available: What’s New!

FHN March 29, 2024
Wireshark continues to reign supreme, providing unmatched tools for troubleshooting, analysis, development, and education. The latest release,...
Read More Read more about Wireshark 4.2.4 is now available: What’s New!
Apple Silicon Unveils GoFetch Vulnerability m1-chip
  • Apple
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Apple Silicon Unveils GoFetch Vulnerability

FHN March 29, 2024
Researchers have revealed a vulnerability in Apple Silicon processors called GoFetch, enabling attackers to extract secret keys...
Read More Read more about Apple Silicon Unveils GoFetch Vulnerability
Apple ID Push Bombing Attack: Targeting Apple Users to Steal Passwords Cybersecurity
  • Apple
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Apple ID Push Bombing Attack: Targeting Apple Users to Steal Passwords

FHN March 29, 2024
Apple users are being targeted by a sophisticated phishing campaign aimed at seizing control of their Apple...
Read More Read more about Apple ID Push Bombing Attack: Targeting Apple Users to Steal Passwords
Hackers deploy weaponized PDF files to distribute Mispadu banking malware Hacking_NEW1-1
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers deploy weaponized PDF files to distribute Mispadu banking malware

FHN March 28, 2024
Originally focused on Latin America, the banking trojan Mispadu has broadened its scope to Europe, employing phishing...
Read More Read more about Hackers deploy weaponized PDF files to distribute Mispadu banking malware
Watch out for free Android VPN apps that transform your device into proxies WiFi-Mobile-VPN-e1611938755461
  • BOTNET
  • Android malware
  • Compromised
  • Exploitation
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Watch out for free Android VPN apps that transform your device into proxies

FHN March 27, 2024
Security specialists have unearthed a group of Android VPN apps that surreptitiously convert user devices into proxy...
Read More Read more about Watch out for free Android VPN apps that transform your device into proxies
Threat actors employ Tycoon 2FA kits to pilfer your data through deceptive login pages 1598977402295
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

Threat actors employ Tycoon 2FA kits to pilfer your data through deceptive login pages

FHN March 26, 2024
Cybercriminals leverage 2FA (Two-Factor Authentication) phishing kits to bypass the added security layer provided by 2FA. These...
Read More Read more about Threat actors employ Tycoon 2FA kits to pilfer your data through deceptive login pages
Attention Linux admins: Fake PuTTY client installing Rhadamanthys stealer detected! hqdefault
  • Linux Malware
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Attention Linux admins: Fake PuTTY client installing Rhadamanthys stealer detected!

FHN March 26, 2024
A malvertising campaign distributing a fake PuTTY client has been discovered, aiming to deploy the dangerous Rhadamanthys...
Read More Read more about Attention Linux admins: Fake PuTTY client installing Rhadamanthys stealer detected!
Patch Now: Exploits Targeting 2 Firefox Zero-Days Unveiled at Pwn2Own firefox-mozilla
  • Zero Day Attack
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Patch Now: Exploits Targeting 2 Firefox Zero-Days Unveiled at Pwn2Own

FHN March 26, 2024
Mozilla has swiftly responded to two zero-day vulnerabilities exploited during the recent Pwn2Own Vancouver 2024 hacking contest...
Read More Read more about Patch Now: Exploits Targeting 2 Firefox Zero-Days Unveiled at Pwn2Own
New Sysrv Botnet Abuses Google Subdomain to Spread XMRig Miner Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

New Sysrv Botnet Abuses Google Subdomain to Spread XMRig Miner

FHN March 25, 2024
First identified in 2020, the Sysrv botnet leverages a Golang worm to infect devices, deploying cryptominers through...
Read More Read more about New Sysrv Botnet Abuses Google Subdomain to Spread XMRig Miner
Over 170,000 GitHub accounts of Python developers hacked in supply chain attack. Software development concept. Python programming language inside
  • Compromised
  • BOTNET
  • cyberattack
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Over 170,000 GitHub accounts of Python developers hacked in supply chain attack.

FHN March 25, 2024
Over 170,000 users have been affected by a sophisticated attack targeting the Python software supply chain. The...
Read More Read more about Over 170,000 GitHub accounts of Python developers hacked in supply chain attack.
DHCP Exploited for Privilege Escalation in Windows Domains dhcp
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • windows

DHCP Exploited for Privilege Escalation in Windows Domains

FHN March 22, 2024
Security researchers have discovered a sophisticated method, named “DHCP Coerce,” that exploits the Dynamic Host Configuration Protocol...
Read More Read more about DHCP Exploited for Privilege Escalation in Windows Domains
New Acoustic Keyboard Side Channel Attack Allows Theft of Sensitive Data qaGrbns342bf9MHsGc3bU8
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

New Acoustic Keyboard Side Channel Attack Allows Theft of Sensitive Data

FHN March 21, 2024
With the rise in digital device usage, personal data security has become increasingly important. Side-channel attacks exploit...
Read More Read more about New Acoustic Keyboard Side Channel Attack Allows Theft of Sensitive Data
Microsoft announces a significant domain change for Teams microsoft-hacked
  • Security Update
  • Internet Security
  • Microsoft
  • Mobile Security
  • Security Advisory

Microsoft announces a significant domain change for Teams

FHN March 21, 2024
In April 2023, Microsoft announced a multi-year initiative to unify authenticated, user-facing Microsoft 365 apps and services...
Read More Read more about Microsoft announces a significant domain change for Teams
Androxgh0st exploits SMTP services to steal critical data caution sign data unlocking hackers
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

Androxgh0st exploits SMTP services to steal critical data

FHN March 20, 2024
AndroxGh0st targets Laravel applications, scanning and extracting login credentials for AWS and Twilio from .env files. AndroxGh0st,...
Read More Read more about Androxgh0st exploits SMTP services to steal critical data
Operation PhantomBlu: Attackers Exploit Weaponized MS Office Doc to Breach Windows microsoft-word-365-online
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Microsoft
  • Mobile Security
  • Security Advisory
  • Security Update

Operation PhantomBlu: Attackers Exploit Weaponized MS Office Doc to Breach Windows

FHN March 20, 2024
Researchers at Perception Point have discovered a new malware campaign dubbed PhantomBlu, which targets US organizations. The...
Read More Read more about Operation PhantomBlu: Attackers Exploit Weaponized MS Office Doc to Breach Windows
Critical RCE Vulnerability in Fortra FileCatalyst Vulnerabilities and Exploits
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • RCE Flaw
  • Security Advisory
  • Security Update
  • vulnerability

Critical RCE Vulnerability in Fortra FileCatalyst

FHN March 19, 2024
A PoC has been published for a critical RCE vulnerability found in Fortra’s FileCatalyst software. RCE Vulnerability...
Read More Read more about Critical RCE Vulnerability in Fortra FileCatalyst
Discontinued WordPress Plugin Vulnerability Puts Websites at Risk of Cyber Attacks wordpress-g74a560834_1280
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Discontinued WordPress Plugin Vulnerability Puts Websites at Risk of Cyber Attacks

FHN March 19, 2024
A critical vulnerability was found in miniOrange’s Malware Scanner and Web Application Firewall plugins, allowing unauthenticated attackers...
Read More Read more about Discontinued WordPress Plugin Vulnerability Puts Websites at Risk of Cyber Attacks
Google Chrome will soon introduce real-time phishing protection features 1618490397_google-chrome-v90
  • Internet Security
  • Malware
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update
  • Spam

Google Chrome will soon introduce real-time phishing protection features

FHN March 18, 2024
Google has announced an upgrade to its Safe Browsing technology, enhancing Chrome users’ protection against phishing, malware,...
Read More Read more about Google Chrome will soon introduce real-time phishing protection features
A critical flaw in Zoom Clients allows attackers to escalate privileges images (1)
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

A critical flaw in Zoom Clients allows attackers to escalate privileges

FHN March 18, 2024
A vulnerability categorized as improper input validation was discovered in Zoom Clients for Windows, Zoom VDI Client...
Read More Read more about A critical flaw in Zoom Clients allows attackers to escalate privileges
GitHub Campaign Targets Users to Steal Login Credentials GitHub
  • BOTNET
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

GitHub Campaign Targets Users to Steal Login Credentials

FHN March 15, 2024
Threat actors frequently target GitHub users because of the abundance of valuable code repositories and sensitive information...
Read More Read more about GitHub Campaign Targets Users to Steal Login Credentials
Hackers weaponize LNK files to deploy AutoIt malware 1703981734291
  • Compromised
  • BOTNET
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Hackers weaponize LNK files to deploy AutoIt malware

FHN March 15, 2024
Hackers are using weaponized LNK files to deploy AutoIt malware, causing concern in the cybersecurity community. The...
Read More Read more about Hackers weaponize LNK files to deploy AutoIt malware
Hackers deploy TMChecker RAT to target popular VPN and mail servers Phishing-Attacks_-Recognize-and-Avoid-Email-Phishing-1
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Hackers deploy TMChecker RAT to target popular VPN and mail servers

FHN March 14, 2024
A new tool discovered on the Dark Web indicates a change in cybercriminal tactics for illicitly accessing...
Read More Read more about Hackers deploy TMChecker RAT to target popular VPN and mail servers
PixPirate, an Android banking malware 7_In-this-photo-illustration-a-Android-logo-seen-displayed-on
  • BOTNET
  • Android banking trojan
  • Android malware
  • Compromised
  • Exploitation
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

PixPirate, an Android banking malware

FHN March 13, 2024
PixPirate, an Android banking malware, is pioneering stealth techniques to evade detection. IBM Trusteer researchers have unveiled...
Read More Read more about PixPirate, an Android banking malware
Adobe Reader Infostealer Spreads Through Email in Brazil 1701328826685
  • BOTNET
  • Compromised
  • Exploitation
  • infostealer
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update

Adobe Reader Infostealer Spreads Through Email in Brazil

FHN March 13, 2024
A recent email spam campaign is distributing infostealer malware disguised as an Adobe Reader Installer. The spam...
Read More Read more about Adobe Reader Infostealer Spreads Through Email in Brazil
The SSRF flaw in ChatGPT-Next-Web allowed attackers to gain unauthorized access. vulnerability
  • vulnerability
  • Internet Security
  • Security Advisory
  • Security Update

The SSRF flaw in ChatGPT-Next-Web allowed attackers to gain unauthorized access.

FHN March 12, 2024
In addition to ChatGPT and Gemini AI, two of the most popular publicly available Artificial Intelligence systems,...
Read More Read more about The SSRF flaw in ChatGPT-Next-Web allowed attackers to gain unauthorized access.
BianLian Exploits TeamCity Vulnerability to Install Backdoors jbst-021_teamcity_2
  • Exploitation
  • Backdoor
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

BianLian Exploits TeamCity Vulnerability to Install Backdoors

FHN March 12, 2024
The cybercriminal group BianLian, recognized for their ransomware assaults, has garnered attention from the information security community....
Read More Read more about BianLian Exploits TeamCity Vulnerability to Install Backdoors
Vulnerability in Over 150,000 Fortinet Devices Enables Remote Execution of Arbitrary Code by Hackers desktop-wallpaper-animation-fortinet
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update
  • vulnerability

Vulnerability in Over 150,000 Fortinet Devices Enables Remote Execution of Arbitrary Code by Hackers

FHN March 11, 2024
A critical security flaw, identified as CVE-2024-21762, has been uncovered in Fortinet’s FortiOS and FortiProxy secure web...
Read More Read more about Vulnerability in Over 150,000 Fortinet Devices Enables Remote Execution of Arbitrary Code by Hackers
Analysis and Description of Win32/Softcnapp Detection pua-win32-softcnapp-thumbnail
  • Security Update
  • Internet Security
  • Microsoft
  • Security Advisory
  • Tips

Analysis and Description of Win32/Softcnapp Detection

FHN March 11, 2024
PUA:Win32/Softcnapp is a generic detection name used by Microsoft Defender to identify unwanted programs. It can occasionally...
Read More Read more about Analysis and Description of Win32/Softcnapp Detection
CHAVECLOAK Malware Exploits Windows Through Weaponized PDF File Facebook – Image Sharing 1200x628_1646478174
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update
  • windows

CHAVECLOAK Malware Exploits Windows Through Weaponized PDF File

FHN March 8, 2024
CHAVECLOAK is a type of malware, specifically a banking trojan, known for targeting users, particularly in Brazil,...
Read More Read more about CHAVECLOAK Malware Exploits Windows Through Weaponized PDF File
Gitlab Authorization Bypass Vulnerability Enables Theft of Protected Variables gitlab-650
  • vulnerability
  • Internet Security
  • Mobile Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

Gitlab Authorization Bypass Vulnerability Enables Theft of Protected Variables

FHN March 8, 2024
GitLab has released updated versions for its Community Edition (CE) and Enterprise Edition (EE) platforms, addressing critical...
Read More Read more about Gitlab Authorization Bypass Vulnerability Enables Theft of Protected Variables
Web Server Compromised by Hackers for z0Miner Malware Deployment malware_fire
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Web Server Compromised by Hackers for z0Miner Malware Deployment

FHN March 7, 2024
The malicious actor, known as “z0miner,” has been discovered targeting Korean WebLogic servers to disseminate various forms...
Read More Read more about Web Server Compromised by Hackers for z0Miner Malware Deployment
Cybercriminals Exploiting iOS 0-day Vulnerability to Target iPhones – Update Immediately! apple-iphone
  • vulnerability
  • Apple
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Zero Day Attack

Cybercriminals Exploiting iOS 0-day Vulnerability to Target iPhones – Update Immediately!

FHN March 6, 2024
Two zero-day vulnerabilities have been uncovered in iOS and iPadOS 17.4 versions, enabling threat actors to circumvent...
Read More Read more about Cybercriminals Exploiting iOS 0-day Vulnerability to Target iPhones – Update Immediately!
WogRAT Malware Leverages Notepad Service to Target Windows & Linux Systems alerta_malware
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Linux Malware
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • windows

WogRAT Malware Leverages Notepad Service to Target Windows & Linux Systems

FHN March 6, 2024
Malware leverages the Notepad service to target systems like Windows and Linux, exploiting the ubiquity of Notepad...
Read More Read more about WogRAT Malware Leverages Notepad Service to Target Windows & Linux Systems
TeamCity On-Premises Vulnerabilities Pose Risks to Supply Chains vulnerability
  • Compromised
  • BOTNET
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

TeamCity On-Premises Vulnerabilities Pose Risks to Supply Chains

FHN March 5, 2024
Two fresh security vulnerabilities have surfaced in JetBrains TeamCity On-Premises, a prevalent CI/CD solution. Designated as CVE-2024-27198...
Read More Read more about TeamCity On-Premises Vulnerabilities Pose Risks to Supply Chains
Cybercriminals Employing Innovative DNS Hijacking Technique for Investment Scams IoT-Botnets-Fuels-DDoS-Attacks-Are-You-Prepared
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Cybercriminals Employing Innovative DNS Hijacking Technique for Investment Scams

FHN March 5, 2024
A recently identified DNS threat actor known as Savvy Seahorse is employing advanced tactics to lure victims...
Read More Read more about Cybercriminals Employing Innovative DNS Hijacking Technique for Investment Scams
SMS Bombing: The Risks and Dangers of Text Message Attacks main-qimg-71379a3738cde9ff7a24e6fde55e7f61-lq
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

SMS Bombing: The Risks and Dangers of Text Message Attacks

FHN March 4, 2024
In the realm of cybersecurity, SMS Bomber attacks are emerging as a modern threat with significant and...
Read More Read more about SMS Bombing: The Risks and Dangers of Text Message Attacks
Beware: Business Email Compromise (BEC) Attacks Threaten Organizations 1615752341184
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update
  • Spam
  • Tips

Beware: Business Email Compromise (BEC) Attacks Threaten Organizations

FHN March 4, 2024
The pandemic has spurred significant shifts in business models. With the rise of digital transformation, increased efficiency,...
Read More Read more about Beware: Business Email Compromise (BEC) Attacks Threaten Organizations
New Bifrost malware for Linux mimics VMware domain for evasion f090d985fc52be2d94efc9c334a1f535612f6348
  • BOTNET
  • Compromised
  • Exploitation
  • Linux Malware
  • malicious cyber actors
  • Malware
  • Regulation
  • Security Advisory
  • Security Update
  • Tips
  • VMware

New Bifrost malware for Linux mimics VMware domain for evasion

FHN March 1, 2024
A new Linux variant of Bifrost, called Bifrose, was detected employing a clever evasion tactic by utilizing...
Read More Read more about New Bifrost malware for Linux mimics VMware domain for evasion
Emerging Phishing Kit Exploits SMS and Voice Calls to Target Cryptocurrency Users Cyber Security Smart Devices. Cloud Computing Data Breach
  • phishing
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Emerging Phishing Kit Exploits SMS and Voice Calls to Target Cryptocurrency Users

FHN March 1, 2024
A newly discovered phishing kit has been observed impersonating the login pages of prominent cryptocurrency services as...
Read More Read more about Emerging Phishing Kit Exploits SMS and Voice Calls to Target Cryptocurrency Users
Hackers Exploit SVG Image Files for GUloader Malware Distribution bug-virus-malware-freepik
  • Compromised
  • Darknet
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Hackers Exploit SVG Image Files for GUloader Malware Distribution

FHN February 29, 2024
Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of the GUloader...
Read More Read more about Hackers Exploit SVG Image Files for GUloader Malware Distribution
Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes download
  • BOTNET
  • Compromised
  • Exploitation
  • hackers
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes

FHN February 29, 2024
Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of concealing malicious...
Read More Read more about Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes
Malicious npm Packages: North Korean Hackers Targeting Developers 1_6UYEOgkekbzX3yaXCzmO5g
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Mobile Security
  • Security Advisory
  • Security Update

Malicious npm Packages: North Korean Hackers Targeting Developers

FHN February 28, 2024
Recent discoveries by Phylum indicate that a series of counterfeit npm packages identified on the Node.js repository...
Read More Read more about Malicious npm Packages: North Korean Hackers Targeting Developers
SSH-Snake Malware: Stealing SSH Keys to Expand Network Spread DDOS_Attacks-What_How_and_the_Emergence_of_AI-powered_DDoS_Blog_Featured_Image-scaled
  • Malware
  • BOTNET
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Mobile Security
  • Security Advisory
  • Security Update

SSH-Snake Malware: Stealing SSH Keys to Expand Network Spread

FHN February 28, 2024
Threat actors exploit SSH credentials to gain unauthorized access to systems and networks, executing malicious activities by...
Read More Read more about SSH-Snake Malware: Stealing SSH Keys to Expand Network Spread
LiteSpeed Plugin Vulnerability Exposes 5 Million WordPress Sites to Risk wordpress
  • vulnerability
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • wordpress

LiteSpeed Plugin Vulnerability Exposes 5 Million WordPress Sites to Risk

FHN February 27, 2024
Researchers at Patchstack have issued a warning regarding an unauthenticated site-wide stored XSS vulnerability, identified as CVE-2023-40000,...
Read More Read more about LiteSpeed Plugin Vulnerability Exposes 5 Million WordPress Sites to Risk
Xeno RAT Exploits Windows DLL Search to Evade Detection 2509
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • windows

Xeno RAT Exploits Windows DLL Search to Evade Detection

FHN February 27, 2024
A newly identified, sophisticated malware coded in C# has emerged. Dubbed Xeno RAT, this malware boasts advanced...
Read More Read more about Xeno RAT Exploits Windows DLL Search to Evade Detection
Compromised PyPI Package Deploys NovaSentinel Stealer on Windows python
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • windows

Compromised PyPI Package Deploys NovaSentinel Stealer on Windows

FHN February 26, 2024
Researchers uncovered an advanced cyberattack involving a dormant Python Package Index (PyPI) package called Django-log-tracker, which was...
Read More Read more about Compromised PyPI Package Deploys NovaSentinel Stealer on Windows
LockBit Returns, Unveiling Fresh Claims and Victims lockbit_blog_thumnail
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • Mobile Security
  • Ransomware
  • Security Advisory
  • Security Update
  • Tips

LockBit Returns, Unveiling Fresh Claims and Victims

FHN February 26, 2024
The narrative surrounding the takedown of the LockBit ransomware on February 19 is still evolving. Following nearly...
Read More Read more about LockBit Returns, Unveiling Fresh Claims and Victims
Microsoft Initiates Wi-Fi 7 Testing in Windows 11 windows-11-wi-fi-7-not-supported-windows-10-featured
  • Internet Security
  • Microsoft
  • Mobile Security
  • Regulation
  • Security Advisory
  • Security Update
  • Tips
  • windows

Microsoft Initiates Wi-Fi 7 Testing in Windows 11

FHN February 23, 2024
Microsoft has commenced testing Wi-Fi 7 compatibility within the Windows 11 Insider Preview Build 26063. Initially available...
Read More Read more about Microsoft Initiates Wi-Fi 7 Testing in Windows 11
Analysts Expose Apple’s Latest Zero-Click Shortcuts Vulnerability apple-keyway-800x450
  • BOTNET
  • Apple
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Analysts Expose Apple’s Latest Zero-Click Shortcuts Vulnerability

FHN February 23, 2024
Information has surfaced regarding a recently patched high-severity security vulnerability in Apple’s Shortcuts app, allowing a shortcut...
Read More Read more about Analysts Expose Apple’s Latest Zero-Click Shortcuts Vulnerability
Multiple Cross-Site Scripting (XSS) Flaws in Joomla Could Result in Remote Code Execution Vulnerability-Management-Program-Best-Practices-1
  • Remote code execution
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Multiple Cross-Site Scripting (XSS) Flaws in Joomla Could Result in Remote Code Execution

FHN February 22, 2024
Five vulnerabilities have been discovered within the Joomla content management system that could be exploited to execute...
Read More Read more about Multiple Cross-Site Scripting (XSS) Flaws in Joomla Could Result in Remote Code Execution
MrB Ransomware (.mrB Files) – Analysis & File Recovery 950b505ae76246cbb5abef489df96431
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Ransomware
  • Security Advisory
  • Security Update
  • Tips

MrB Ransomware (.mrB Files) – Analysis & File Recovery

FHN February 22, 2024
MrB ransomware, a variant of Dharma ransomware, was identified on February 21, 2024. It encrypts files with...
Read More Read more about MrB Ransomware (.mrB Files) – Analysis & File Recovery
New Wi-Fi Authentication Bypass Vulnerabilities Pose Threat to Home and Enterprise Networks 1_I2vfojmOT2iACIt-D25f4g
  • vulnerability
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

New Wi-Fi Authentication Bypass Vulnerabilities Pose Threat to Home and Enterprise Networks

FHN February 21, 2024
Two recently discovered Wi-Fi authentication bypass vulnerabilities in open-source software could potentially expose numerous enterprise and home...
Read More Read more about New Wi-Fi Authentication Bypass Vulnerabilities Pose Threat to Home and Enterprise Networks
Critical Vulnerabilities in ConnectWise ScreenConnect, PostgreSQL JDBC, and VMware EAP ICS-vulnerabilities-cybersecurity-feature-May-9-2022-web
  • Tips
  • BOTNET
  • Compromised
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Critical Vulnerabilities in ConnectWise ScreenConnect, PostgreSQL JDBC, and VMware EAP

FHN February 21, 2024
ConnectWise has remedied a critical vulnerability rated CVSS 10 in its ScreenConnect product, a desktop and mobile...
Read More Read more about Critical Vulnerabilities in ConnectWise ScreenConnect, PostgreSQL JDBC, and VMware EAP
Migo Malware: Targeting Redis Servers for Cryptocurrency Mining images
  • BOTNET
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Migo Malware: Targeting Redis Servers for Cryptocurrency Mining

FHN February 20, 2024
A recent malware campaign has been detected, focusing on gaining initial access through Redis servers, aiming to...
Read More Read more about Migo Malware: Targeting Redis Servers for Cryptocurrency Mining
Mastodon Security Flaw Enables Account Takeover vulnerability
  • BOTNET
  • Compromised
  • cyberattack
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Mastodon Security Flaw Enables Account Takeover

FHN February 20, 2024
Cybersecurity experts have uncovered a critical vulnerability in the decentralized social network Mastodon, potentially enabling unauthorized access...
Read More Read more about Mastodon Security Flaw Enables Account Takeover
Meta Warns of 8 Spyware Companies Targeting iOS, Android, and Windows Devices 18aea61b3c0c63500a1b0492c8bd5107
  • spyware
  • Android malware
  • Apple
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • windows

Meta Warns of 8 Spyware Companies Targeting iOS, Android, and Windows Devices

FHN February 19, 2024
Meta Platforms announced it has taken measures to combat malicious activities originating from eight firms in Italy,...
Read More Read more about Meta Warns of 8 Spyware Companies Targeting iOS, Android, and Windows Devices
SYSDF Ransomware: Analysis, .SYSDF File Recovery, and Removal Guide Ransomware-Report-Photo
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Malware
  • Mobile Security
  • Ransomware
  • Security Advisory
  • Security Update

SYSDF Ransomware: Analysis, .SYSDF File Recovery, and Removal Guide

FHN February 19, 2024
SYSDF is a ransomware program belonging to the Dharma malware family. Typically targeting small businesses, it encrypts...
Read More Read more about SYSDF Ransomware: Analysis, .SYSDF File Recovery, and Removal Guide
Ov3r_Stealer: Targeting Cryptocurrency and Credentials via Facebook Job Ads DDOS_Attacks-What_How_and_the_Emergence_of_AI-powered_DDoS_Blog_Featured_Image-scaled
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Ov3r_Stealer: Targeting Cryptocurrency and Credentials via Facebook Job Ads

FHN February 16, 2024
“A recent report by Trustwave SpiderLabs reveals the emergence of Ov3r_Stealer, a Windows malware propagated through deceptive...
Read More Read more about Ov3r_Stealer: Targeting Cryptocurrency and Credentials via Facebook Job Ads
Malicious ‘SNS Sender’ Script Exploits AWS for Mass Smishing Campaigns blog-social-smishing-1200x628-1
  • BOTNET
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update
  • Spam

Malicious ‘SNS Sender’ Script Exploits AWS for Mass Smishing Campaigns

FHN February 16, 2024
A malicious Python script named SNS Sender is being promoted as a tool for threat actors to...
Read More Read more about Malicious ‘SNS Sender’ Script Exploits AWS for Mass Smishing Campaigns
Shim Bootloader Vulnerability Detected in Linux Systems linuxfeatured
  • vulnerability
  • BOTNET
  • Exploitation
  • Linux Malware
  • Malware
  • Security Advisory
  • Security Update
  • Tips

Shim Bootloader Vulnerability Detected in Linux Systems

FHN February 15, 2024
Security researchers have uncovered a critical vulnerability in Shim, a commonly used Linux bootloader. This flaw has...
Read More Read more about Shim Bootloader Vulnerability Detected in Linux Systems
Zoom patched seven vulnerabilities across Windows, iOS, and Android, including one critical flaw (CVE-2024-24691) shutterstock_1746507200-scaled-1-768x512
  • BOTNET
  • Android malware
  • Exploitation
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability
  • windows

Zoom patched seven vulnerabilities across Windows, iOS, and Android, including one critical flaw (CVE-2024-24691)

FHN February 15, 2024
Zoom, the well-known video conferencing platform, recently patched 7 security vulnerabilities in a recent update. These vulnerabilities...
Read More Read more about Zoom patched seven vulnerabilities across Windows, iOS, and Android, including one critical flaw (CVE-2024-24691)
Beware of Malicious Fake ChatGPT Apps smartphone-screen-with-chatgpt-chat-ai-tool-and-artificial-intelligence-chatbot-from-openai-chatgpt-site-free-vector
  • BOTNET
  • Compromised
  • Darknet
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Beware of Malicious Fake ChatGPT Apps

FHN February 14, 2024
The public release of ChatGPT caused a sensation back in 2022, and it’s fair to say it’s...
Read More Read more about Beware of Malicious Fake ChatGPT Apps
HijackLoader Malware Introduces Fresh Evasion Techniques action
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

HijackLoader Malware Introduces Fresh Evasion Techniques

FHN February 13, 2024
The HijackLoader malware has incorporated additional defense evasion tactics. Increasingly, other threat actors are leveraging this malware...
Read More Read more about HijackLoader Malware Introduces Fresh Evasion Techniques
New Fortinet VPN RCE Vulnerability Uncovered: Apply Patch Immediately fortinert
  • BOTNET
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

New Fortinet VPN RCE Vulnerability Uncovered: Apply Patch Immediately

FHN February 13, 2024
Fortinet has issued a warning regarding a critical vulnerability found in its FortiOS SSL VPN system, which...
Read More Read more about New Fortinet VPN RCE Vulnerability Uncovered: Apply Patch Immediately
GitLab Security Flaw (CVE-2024-0402) Raises Concerns of File Overwrite Risk Vulnerabilities and Exploits
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

GitLab Security Flaw (CVE-2024-0402) Raises Concerns of File Overwrite Risk

FHN February 2, 2024
In a recent security update, GitLab has released a patch addressing a critical vulnerability that could permit...
Read More Read more about GitLab Security Flaw (CVE-2024-0402) Raises Concerns of File Overwrite Risk
A critical vulnerability in Apple iOS and macOS has been discovered and exploited apple-security-hns2
  • BOTNET
  • Apple
  • Compromised
  • cyberattack
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

A critical vulnerability in Apple iOS and macOS has been discovered and exploited

FHN February 2, 2024
The Cybersecurity and Infrastructure Security Agency has identified a security flaw in Apple operating systems, specifically iOS...
Read More Read more about A critical vulnerability in Apple iOS and macOS has been discovered and exploited
Kasseika Ransomware Exploits Vulnerable Antivirus Drivers Ransomware-Report-Photo
  • BOTNET
  • Compromised
  • cyberattack
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

FHN January 30, 2024
A recently discovered ransomware, named “Kasseika,” employs Bring Your Own Vulnerable Driver tactics to incapacitate antivirus software...
Read More Read more about Kasseika Ransomware Exploits Vulnerable Antivirus Drivers
Discovery of Authentication Bypass Vulnerability in GoAnywhere MFT file-sharing-concept-data-transfer-ftp-file-receiver-and-backup-on-tablet-screen-file-transfer-in-notebooks-vector (1)
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Discovery of Authentication Bypass Vulnerability in GoAnywhere MFT

FHN January 25, 2024
Fortra has revealed a critical vulnerability in its GoAnywhere MFT (Managed File Transfer) software—an authentication bypass that...
Read More Read more about Discovery of Authentication Bypass Vulnerability in GoAnywhere MFT
Apple resolves the first zero-day bug exploited in attacks this year Detail from Apple shop in Tokyo, Japan. Apple is American multinational corporation founded at 1976 at Cupertino, California.
  • Zero Day Attack
  • Apple
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Apple resolves the first zero-day bug exploited in attacks this year

FHN January 24, 2024
Apple has issued security updates to tackle the first zero-day vulnerability of the year, which has been...
Read More Read more about Apple resolves the first zero-day bug exploited in attacks this year
GitHub Developer SSH Keys Targeted Through Malicious npm Packages 1_6UYEOgkekbzX3yaXCzmO5g
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

GitHub Developer SSH Keys Targeted Through Malicious npm Packages

FHN January 24, 2024
Security researchers recently discovered two new malicious packages on the npm open source package manager. These packages...
Read More Read more about GitHub Developer SSH Keys Targeted Through Malicious npm Packages
Active Exploitation of 2 Citrix Remote Code Execution (RCE) Vulnerabilities, CISA Issues Notification citrix1
  • BOTNET
  • cisco
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Active Exploitation of 2 Citrix Remote Code Execution (RCE) Vulnerabilities, CISA Issues Notification

FHN January 24, 2024
CISA has set a deadline of one to three weeks for addressing three vulnerabilities associated with Citrix...
Read More Read more about Active Exploitation of 2 Citrix Remote Code Execution (RCE) Vulnerabilities, CISA Issues Notification
New Godzilla Web Shell Attacks Exploit Apache ActiveMQ Flaw Ransomware-Attacks
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

New Godzilla Web Shell Attacks Exploit Apache ActiveMQ Flaw

FHN January 23, 2024
Cybersecurity researchers caution about a significant rise in threat actor activity exploiting a recently patched flaw in...
Read More Read more about New Godzilla Web Shell Attacks Exploit Apache ActiveMQ Flaw
LockBit Ransomware Uses Resume Word Files to Spread Cyber Security Destroyed Concept.padlock Red Open On Electric Ci
  • Compromised
  • Exploitation
  • Internet Security
  • Malware
  • Mobile Security
  • Ransomware
  • Security Advisory
  • Security Update

LockBit Ransomware Uses Resume Word Files to Spread

FHN January 22, 2024
An ASEC investigation has uncovered the latest tactics employed by the notorious LockBit ransomware. Under the guise...
Read More Read more about LockBit Ransomware Uses Resume Word Files to Spread
Latest Docker Malware: CPU Theft for Crypto and Fake Website Traffic Generation warning-cybersecurity-types-of-cyber-attacks
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Latest Docker Malware: CPU Theft for Crypto and Fake Website Traffic Generation

FHN January 19, 2024
A recently launched campaign aimed at vulnerable Docker services installs both an XMRig miner and the 9hits...
Read More Read more about Latest Docker Malware: CPU Theft for Crypto and Fake Website Traffic Generation
Critical Vulnerability: 178,000 SonicWall Firewalls at Risk of DoS and RCE Kritieke-SonicOS-kwetsbaarheid-heeft-invloed-op-SonicWall-Firewall-apparaten
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • RCE Flaw
  • SonicWall
  • vulnerability

Critical Vulnerability: 178,000 SonicWall Firewalls at Risk of DoS and RCE

FHN January 19, 2024
Recent research reveals a substantial number of vulnerable SonicWall firewall instances susceptible to remote code execution (RCE)...
Read More Read more about Critical Vulnerability: 178,000 SonicWall Firewalls at Risk of DoS and RCE
Atlassian’s Confluence Data Center and Server Affected by Critical RCE Vulnerability atlassian_blog_thumnail
  • Compromised
  • Exploitation
  • Internet Security
  • RCE Flaw
  • Security Advisory
  • Security Update
  • vulnerability

Atlassian’s Confluence Data Center and Server Affected by Critical RCE Vulnerability

FHN January 18, 2024
Atlassian recommends that its customers update their Confluence Data Center and Server to safeguard against the exploitation...
Read More Read more about Atlassian’s Confluence Data Center and Server Affected by Critical RCE Vulnerability
AzorUlt Stealer Resurfaces, Employing Email Phishing Tactics Phishing-vector - Copy
  • BOTNET
  • Compromised
  • Darknet
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update
  • Spam

AzorUlt Stealer Resurfaces, Employing Email Phishing Tactics

FHN January 17, 2024
Cybersecurity experts have rediscovered the eight-year-old Azorult malware, known for stealing information and harvesting sensitive data. The...
Read More Read more about AzorUlt Stealer Resurfaces, Employing Email Phishing Tactics
New Google Chrome 0-day Vulnerability Exploited news-about-google-chrome-zero-day-vulnerability_en
  • Internet Security
  • google
  • Security Advisory
  • Security Update
  • Zero Day Attack

New Google Chrome 0-day Vulnerability Exploited

FHN January 17, 2024
In the latest release notes, Google discloses a newly discovered 0-day vulnerability already being exploited in the...
Read More Read more about New Google Chrome 0-day Vulnerability Exploited
Can Patches Prevent Zero-Day Attacks? Zero day concept cell blurred background 3d illustration
  • BOTNET
  • Backdoor
  • Compromised
  • cyberattack
  • Darknet
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • Zero Day Attack

Can Patches Prevent Zero-Day Attacks?

FHN January 16, 2024
In recent years, zero-day exploits and attacks have emerged as prominent threats. Leveraging unknown vulnerabilities within software,...
Read More Read more about Can Patches Prevent Zero-Day Attacks?
GitLab Zero-Click Account Hijack Vulnerability Revealed GitHub
  • BOTNET
  • Evilproxy
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

GitLab Zero-Click Account Hijack Vulnerability Revealed

FHN January 16, 2024
On January 11, 2024, GitLab issued an update containing a crucial security fix for a vulnerability. This...
Read More Read more about GitLab Zero-Click Account Hijack Vulnerability Revealed
Windows SmartScreen Bypass Exploited by Information Stealer how-to-unblock-a-file-blocked-by-windows-defender-smartscreen-in-windows-10-525717-2
  • BOTNET
  • Compromised
  • cyberattack
  • Exploitation
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Windows SmartScreen Bypass Exploited by Information Stealer

FHN January 16, 2024
The malicious campaign leverages the CVE-2023-36025 vulnerability in Microsoft Windows Defender SmartScreen to propagate Phemedrone Stealer. Employing...
Read More Read more about Windows SmartScreen Bypass Exploited by Information Stealer
Researchers identify FBot hacking tool hijacking cloud and payment services. xXaZ3Lb4ZEejUv9ipwK3ha
  • BOTNET
  • Compromised
  • cyberattack
  • Darknet
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Researchers identify FBot hacking tool hijacking cloud and payment services.

FHN January 12, 2024
SentinelOne’s malware hunters flagged a recently uncovered Python-based hacking tool employed by cybercriminals to hijack cloud platforms...
Read More Read more about Researchers identify FBot hacking tool hijacking cloud and payment services.
High Severity Vulnerability in Cisco Unity Connection Could Enable Root Privileges (CVE-2024-20272) uTLwBhC26YCauAq8Swffd8-1200-80
  • Exploitation
  • cisco
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

High Severity Vulnerability in Cisco Unity Connection Could Enable Root Privileges (CVE-2024-20272)

FHN January 12, 2024
Cisco has successfully addressed a high-severity security vulnerability in Unity Connection. This flaw had the potential to...
Read More Read more about High Severity Vulnerability in Cisco Unity Connection Could Enable Root Privileges (CVE-2024-20272)
Volexity detects Chinese hackers exploiting zero-day vulnerabilities in Ivanti VPN. Zero-Day Exploit
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Volexity detects Chinese hackers exploiting zero-day vulnerabilities in Ivanti VPN.

FHN January 11, 2024
On Wednesday, cybersecurity researchers at Volexity issued a warning, revealing that suspected Chinese nation-state hackers are currently...
Read More Read more about Volexity detects Chinese hackers exploiting zero-day vulnerabilities in Ivanti VPN.
Water Curupira Hackers Spreading PikaBot Loader Malware 64062bd32c1bbdcb6c3db8d4_bumblee-malware-analysis
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Water Curupira Hackers Spreading PikaBot Loader Malware

FHN January 10, 2024
In 2023, the threat actor known as Water Curupira has been actively disseminating the PikaBot loader malware...
Read More Read more about Water Curupira Hackers Spreading PikaBot Loader Malware
Two Adobe ColdFusion Vulnerabilities Exploited in The Wild adobe-coldfusion
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Two Adobe ColdFusion Vulnerabilities Exploited in The Wild

FHN January 10, 2024
Two vulnerabilities in Adobe ColdFusion have been targeted in real-world attacks, as cautioned by the Cybersecurity &...
Read More Read more about Two Adobe ColdFusion Vulnerabilities Exploited in The Wild
SMTP Smuggling Emerges as a Fresh Email Security Concern email-security-threats-types-and-how-to-mitigate
  • BOTNET
  • Compromised
  • Darknet
  • Email servers
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

SMTP Smuggling Emerges as a Fresh Email Security Concern

FHN January 8, 2024
An innovative SMTP Smuggling technique has been reported with the capability to circumvent current security protocols. Additionally,...
Read More Read more about SMTP Smuggling Emerges as a Fresh Email Security Concern
Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Critical Vulnerability STOCK-132_blue-300x225
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Critical Vulnerability

FHN January 8, 2024
Ivanti has resolved a critical vulnerability in its Endpoint Manager (EPM) solution, designated as CVE-2023-39336, carrying a...
Read More Read more about Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Critical Vulnerability
New ‘SpectralBlur’ macOS Backdoor Linked to North Korea ransomware-image-getty
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • MacOS
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

New ‘SpectralBlur’ macOS Backdoor Linked to North Korea

FHN January 5, 2024
Security researchers have delved into the intricacies of SpectralBlur, an emerging macOS backdoor believed to be associated...
Read More Read more about New ‘SpectralBlur’ macOS Backdoor Linked to North Korea
3 Malicious PyPI Packages Target Linux with Crypto Miners python
  • BOTNET
  • Compromised
  • Exploitation
  • Linux Malware
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

3 Malicious PyPI Packages Target Linux with Crypto Miners

FHN January 5, 2024
Fortinet researchers identified three malicious packages in the PyPI repository—modularseven, driftme, and catme. These packages, attributed to...
Read More Read more about 3 Malicious PyPI Packages Target Linux with Crypto Miners
CISA Issues Alert for Juniper Secure Analytics Vulnerabilities 5492096_cd93
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

CISA Issues Alert for Juniper Secure Analytics Vulnerabilities

FHN January 3, 2024
In a recent alert, the Cybersecurity and Infrastructure Security Agency (CISA) highlighted that Juniper has issued security...
Read More Read more about CISA Issues Alert for Juniper Secure Analytics Vulnerabilities
Google accounts may be susceptible to a new hack, and changing the password won’t provide a solution. Google-Launches-New-Open-Source-Bug-Bounty-to-Tackle-Supply
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • google
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Google accounts may be susceptible to a new hack, and changing the password won’t provide a solution.

FHN January 3, 2024
A purportedly new method allows hackers to exploit the OAuth2 authorization protocol to compromise Google accounts. This...
Read More Read more about Google accounts may be susceptible to a new hack, and changing the password won’t provide a solution.
Microsoft Disables MSIX App Installer Protocol acastro_180507_1777_microsoft_0002
  • Compromised
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Microsoft Disables MSIX App Installer Protocol

FHN January 2, 2024
Microsoft has disabled the MSIX installer protocol in Windows in response to its exploitation in real-world cyberattacks....
Read More Read more about Microsoft Disables MSIX App Installer Protocol
Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain xXaZ3Lb4ZEejUv9ipwK3ha
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain

FHN December 30, 2023
A recent Unit 42 investigation uncovered a dual privilege escalation chain affecting Google Kubernetes Engine (GKE). Stemming...
Read More Read more about Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain
Xamalicious Trojan Hits Over 327K Android Devices android-trojan
  • BOTNET
  • Android malware
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Xamalicious Trojan Hits Over 327K Android Devices

FHN December 29, 2023
Researchers uncovered a novel Android backdoor named Xamalicious at the end of 2023. This malware demonstrates significant...
Read More Read more about Xamalicious Trojan Hits Over 327K Android Devices
Remote Encryption Attacks -Explanation & Mitigation shutterstock_1459422656-min
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update

Remote Encryption Attacks -Explanation & Mitigation

FHN December 28, 2023
The digital landscape is witnessing a rise in sophisticated ransomware attacks, specifically remote encryption attacks. While the...
Read More Read more about Remote Encryption Attacks -Explanation & Mitigation
Microsoft Word Documents Used as Lures to Distribute Nim-Based Malware Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Microsoft
  • Security Advisory
  • Security Update

Microsoft Word Documents Used as Lures to Distribute Nim-Based Malware

FHN December 27, 2023
A recently identified phishing campaign is using decoy Microsoft Word documents as a lure to deploy a...
Read More Read more about Microsoft Word Documents Used as Lures to Distribute Nim-Based Malware
Cryptocurrency Scams on Twitter Exploit Post Features Cryptocurrency-fraud
  • BOTNET
  • Compromised
  • Darknet
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Cryptocurrency Scams on Twitter Exploit Post Features

FHN December 26, 2023
Scammers exploit a feature of Twitter posts, deceiving users and putting digital assets at risk. This deceptive...
Read More Read more about Cryptocurrency Scams on Twitter Exploit Post Features
GOOGLE ADDRESSED A NEW ACTIVELY EXPLOITED CHROME ZERO-DAY Google Docs
  • Compromised
  • Exploitation
  • google
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

GOOGLE ADDRESSED A NEW ACTIVELY EXPLOITED CHROME ZERO-DAY

FHN December 22, 2023
Google has issued emergency updates to address yet another Chrome zero-day vulnerability that has been actively exploited...
Read More Read more about GOOGLE ADDRESSED A NEW ACTIVELY EXPLOITED CHROME ZERO-DAY
Microsoft Alerts of RCE and DoS Vulnerabilities in Perforce Server vulnerability
  • Exploitation
  • Compromised
  • Internet Security
  • Microsoft
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Microsoft Alerts of RCE and DoS Vulnerabilities in Perforce Server

FHN December 21, 2023
In the course of a security assessment of its game development studios, Microsoft identified four vulnerabilities in...
Read More Read more about Microsoft Alerts of RCE and DoS Vulnerabilities in Perforce Server
Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users xfinity-650
  • Compromised
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users

FHN December 21, 2023
Comcast has officially acknowledged a significant security breach affecting its Xfinity division, with approximately 36 million customers...
Read More Read more about Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users
Kinsta Alerts About Phishing Campaign on Google Ads Cyber Security Smart Devices. Cloud Computing Data Breach
  • BOTNET
  • Backdoor
  • Compromised
  • cyberattack
  • Email servers
  • Evilproxy
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update
  • Spam

Kinsta Alerts About Phishing Campaign on Google Ads

FHN December 19, 2023
Kinsta, a leading WordPress hosting provider, has alerted its customers to a troubling cybersecurity development. Cybercriminals are...
Read More Read more about Kinsta Alerts About Phishing Campaign on Google Ads
Qbot malware resurfaces in a new campaign focusing on the hospitality sector. QBot-Ransomware-a3c49a3884bc54c0
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • hackers
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Qbot malware resurfaces in a new campaign focusing on the hospitality sector.

FHN December 19, 2023
QakBot malware has re-emerged in phishing campaigns, following a disruption of the botnet by law enforcement during...
Read More Read more about Qbot malware resurfaces in a new campaign focusing on the hospitality sector.
FortiGuard Releases Security Updates for Critical Vulnerabilities xXaZ3Lb4ZEejUv9ipwK3ha
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

FortiGuard Releases Security Updates for Critical Vulnerabilities

FHN December 18, 2023
FortiGuard unveiled security updates on December 12, 2023, to mitigate multiple critical vulnerabilities present in its FortiOS,...
Read More Read more about FortiGuard Releases Security Updates for Critical Vulnerabilities
Google Will Block Third-Party Cookies for All Chrome Users by the Second Half of 2024 google-chrome-logo-2015_story
  • Tips
  • google
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Google Will Block Third-Party Cookies for All Chrome Users by the Second Half of 2024

FHN December 15, 2023
On Thursday, Google declared its plans to initiate testing of a new feature named “Tracking Protection” from...
Read More Read more about Google Will Block Third-Party Cookies for All Chrome Users by the Second Half of 2024
116 Malicious Packages Detected in PyPI Repository, Targeting Windows and Linux Operating Systems Python
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

116 Malicious Packages Detected in PyPI Repository, Targeting Windows and Linux Operating Systems

FHN December 14, 2023
Security experts have uncovered a collection of 116 malicious packages within the Python Package Index (PyPI) repository,...
Read More Read more about 116 Malicious Packages Detected in PyPI Repository, Targeting Windows and Linux Operating Systems
Enhancing Android Security: Google Implements Clang Sanitizers to Safeguard Against Cellular Baseband Vulnerabilities Cybersecurity
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Enhancing Android Security: Google Implements Clang Sanitizers to Safeguard Against Cellular Baseband Vulnerabilities

FHN December 14, 2023
Google Emphasizes Clang Sanitizers in Strengthening Android’s Cellular Baseband Security and Mitigating Vulnerabilities What are Clang sanitizers?...
Read More Read more about Enhancing Android Security: Google Implements Clang Sanitizers to Safeguard Against Cellular Baseband Vulnerabilities
APPLE RELEASED IOS 17.2 TO ADDRESS A DOZEN OF SECURITY FLAWS hero-image.fill.size_1248x702.v1701378279
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

APPLE RELEASED IOS 17.2 TO ADDRESS A DOZEN OF SECURITY FLAWS

FHN December 12, 2023
iOS 17.2 and iPadOS 17.2 have been launched by the company, featuring enhancements that resolve twelve security...
Read More Read more about APPLE RELEASED IOS 17.2 TO ADDRESS A DOZEN OF SECURITY FLAWS
21 Security Flaws Found to Affect Over 86,000 Sierra AirLink Routers IoT-Botnets-Fuels-DDoS-Attacks-Are-You-Prepared
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

21 Security Flaws Found to Affect Over 86,000 Sierra AirLink Routers

FHN December 11, 2023
Researchers Uncover 21 New Sierra Vulnerabilities Affecting Over 86,000 Exposed Online Devices. Sierra AirLink Routers Users of...
Read More Read more about 21 Security Flaws Found to Affect Over 86,000 Sierra AirLink Routers
Microsoft Issues Warning on COLDRIVER: Ongoing Evolution in Evasion and Credential Theft Strategies SeroXen-RAT-Delivered-via-Malicious-NuGet
  • Compromised
  • Darknet
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Microsoft
  • Security Advisory
  • Security Update

Microsoft Issues Warning on COLDRIVER: Ongoing Evolution in Evasion and Credential Theft Strategies

FHN December 7, 2023
COLDRIVER, the threat actor, persists in carrying out credential theft operations targeting entities strategically significant to Russia,...
Read More Read more about Microsoft Issues Warning on COLDRIVER: Ongoing Evolution in Evasion and Credential Theft Strategies
Atlassian Deploys Crucial Software Updates to Mitigate Remote Code Execution Vulnerabilities atlassian_logo
  • Tips
  • BOTNET
  • Compromised
  • Evilproxy
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Atlassian Deploys Crucial Software Updates to Mitigate Remote Code Execution Vulnerabilities

FHN December 7, 2023
Atlassian has issued software patches to rectify four critical vulnerabilities in its software. Successful exploitation of these...
Read More Read more about Atlassian Deploys Crucial Software Updates to Mitigate Remote Code Execution Vulnerabilities
Apple Addresses Exploited Zero-Day Vulnerabilities with Emergency Security Update: CVE-2023-42916, CVE-2023-42917 apple-keyway-800x450
  • Exploitation
  • Apple
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Apple Addresses Exploited Zero-Day Vulnerabilities with Emergency Security Update: CVE-2023-42916, CVE-2023-42917

FHN December 5, 2023
Apple responded to the active exploitation of two zero-day vulnerabilities in the wild by swiftly issuing emergency...
Read More Read more about Apple Addresses Exploited Zero-Day Vulnerabilities with Emergency Security Update: CVE-2023-42916, CVE-2023-42917
Qlik Sense Vulnerabilities Exploited in Ransomware Attacks lock051617
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Ransomware
  • Security Advisory
  • Security Update
  • vulnerability

Qlik Sense Vulnerabilities Exploited in Ransomware Attacks

FHN December 1, 2023
There’s evidence of a CACTUS ransomware campaign exploiting recently revealed security vulnerabilities in Qlik Sense, a cloud...
Read More Read more about Qlik Sense Vulnerabilities Exploited in Ransomware Attacks
Google Introduces RETVec: Gmail’s Latest Safeguard Against Spam and Malicious Emails 2018-11-27-image-2
  • Tips
  • BOTNET
  • Compromised
  • Email servers
  • Internet Security
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update

Google Introduces RETVec: Gmail’s Latest Safeguard Against Spam and Malicious Emails

FHN December 1, 2023
Google has unveiled RETVec (Resilient and Efficient Text Vectorizer), a new multilingual text vectorizer designed to enhance...
Read More Read more about Google Introduces RETVec: Gmail’s Latest Safeguard Against Spam and Malicious Emails
Exploitation Attempts Observed for Critical ownCloud Vulnerability (CVE-2023-49103) vulnerability
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Exploitation Attempts Observed for Critical ownCloud Vulnerability (CVE-2023-49103)

FHN November 30, 2023
The cybersecurity community has expressed concerns as they’ve detected exploitative activities focusing on ownCloud, leveraging the CVE-2023-49103...
Read More Read more about Exploitation Attempts Observed for Critical ownCloud Vulnerability (CVE-2023-49103)
Ensuring Your Security During Black Friday and Cyber Monday 2023 YNY-cybermonday-blog
  • BOTNET
  • cyberattack
  • Darknet
  • Email servers
  • Evilproxy
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update
  • Spam

Ensuring Your Security During Black Friday and Cyber Monday 2023

FHN November 27, 2023
Annually, the holiday season kicks off with the significant retail shopping events in the U.S., Black Friday...
Read More Read more about Ensuring Your Security During Black Friday and Cyber Monday 2023
New Rust-based SysJoker backdoor linked to Hamas hackers 360_F_89863283_Ebmgl0Jpo7aeKFeKFIyfkrxtmqTuEmjJ
  • BOTNET
  • Compromised
  • Darknet
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

New Rust-based SysJoker backdoor linked to Hamas hackers

FHN November 27, 2023
SysJoker, a multi-platform malware, has been identified in a novel iteration, showcasing a comprehensive code overhaul implemented...
Read More Read more about New Rust-based SysJoker backdoor linked to Hamas hackers
CISA Alert: Serious Vulnerabilities in Adobe ColdFusion (CVE-2023-44350, CVE-2023-44351, CVE-2023-44353 and More) b118_shutterstock_719314501
  • BOTNET
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability

CISA Alert: Serious Vulnerabilities in Adobe ColdFusion (CVE-2023-44350, CVE-2023-44351, CVE-2023-44353 and More)

FHN November 23, 2023
An alert has been released by CISA regarding several vulnerabilities affecting Adobe ColdFusion. The alert emphasizes that...
Read More Read more about CISA Alert: Serious Vulnerabilities in Adobe ColdFusion (CVE-2023-44350, CVE-2023-44351, CVE-2023-44353 and More)
DarkGate and PikaBot Malware Resurrect QakBot’s Techniques in New Phishing Assaults Cyber Security Smart Devices. Cloud Computing Data Breach
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • phishing
  • Security Advisory
  • Security Update

DarkGate and PikaBot Malware Resurrect QakBot’s Techniques in New Phishing Assaults

FHN November 21, 2023
Phishing campaigns distributing malware families like DarkGate and PikaBot are employing tactics reminiscent of attacks associated with...
Read More Read more about DarkGate and PikaBot Malware Resurrect QakBot’s Techniques in New Phishing Assaults
Six Steps to Safeguard Small Businesses Against Cyberattacks Cybersecurity
  • Compromised
  • BOTNET
  • cyberattack
  • Darknet
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Six Steps to Safeguard Small Businesses Against Cyberattacks

FHN November 20, 2023
Successful management of cyber risks in small businesses centers on adherence to workplace regulations and the attainment...
Read More Read more about Six Steps to Safeguard Small Businesses Against Cyberattacks
MySQL: Servers Targeted by DDoS-as-a-Service, Ddostf malware-used-to-launch-ddos-attacks-showcase_image-9-a-8656
  • BOTNET
  • Darknet
  • DDOS
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware

MySQL: Servers Targeted by DDoS-as-a-Service, Ddostf

FHN November 20, 2023
Malicious cyber actors exploit MySQL servers through a botnet known as ‘Ddostf,’ utilizing it as a DDoS-as-a-Service...
Read More Read more about MySQL: Servers Targeted by DDoS-as-a-Service, Ddostf
Zimbra Zero-Day Exploited to Hack Government Emails email-security-spam
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Zimbra Zero-Day Exploited to Hack Government Emails

FHN November 17, 2023
Four distinct groups exploited a zero-day vulnerability in the Zimbra Collaboration email software in real-world attacks, aiming...
Read More Read more about Zimbra Zero-Day Exploited to Hack Government Emails
Critical CVE-2023-34060 Vulnerability in VMware Cloud Director Appliance: CISA Advises Immediate Patching vmware-logo-line
  • vulnerability
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • VMware

Critical CVE-2023-34060 Vulnerability in VMware Cloud Director Appliance: CISA Advises Immediate Patching

FHN November 16, 2023
VMware has just released an advisory (VMSA-2023-0026) addressing a critical authentication bypass vulnerability found in the VMware...
Read More Read more about Critical CVE-2023-34060 Vulnerability in VMware Cloud Director Appliance: CISA Advises Immediate Patching
Google Warns of Malicious Exploitation of Bard by Fraudster Munich,,Germany,-,08.,February,2023:,Google,Bard,-,Newest
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • google
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Security Advisory

Google Warns of Malicious Exploitation of Bard by Fraudster

FHN November 15, 2023
Google Files Lawsuit Against Fraudsters Exploiting Bard’s Genetics Artificial Intelligence Hype to Deceptively Distribute Malware. Today, a...
Read More Read more about Google Warns of Malicious Exploitation of Bard by Fraudster
OracleIV DDoS Botnet Malware Targets Docker Engine API Instances IoT-Botnets-Fuels-DDoS-Attacks-Are-You-Prepared
  • BOTNET
  • Compromised
  • cyberattack
  • Darknet
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

OracleIV DDoS Botnet Malware Targets Docker Engine API Instances

FHN November 15, 2023
The OracleIV botnet malware employs various strategies, with a central emphasis on executing DDoS attacks through floods...
Read More Read more about OracleIV DDoS Botnet Malware Targets Docker Engine API Instances
Microsoft warns LinkedIn users of fake skills assessment portals Cybersecurity and data privacy protection concept, lock, binary digits background
  • BOTNET
  • Exploitation
  • Internet Security
  • Microsoft
  • Mobile Security
  • Security Advisory
  • Security Update

Microsoft warns LinkedIn users of fake skills assessment portals

FHN November 14, 2023
A sub-cluster of the notorious Lazarus Group has created deceptive infrastructure mimicking skills assessment portals for inclusion...
Read More Read more about Microsoft warns LinkedIn users of fake skills assessment portals
BiBi-Windows Wiper: Targets Windows in Pro-Hamas attacks Vulnerability-Management-Program-Best-Practices-1
  • BOTNET
  • Compromised
  • cyberattack
  • Darknet
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • windows

BiBi-Windows Wiper: Targets Windows in Pro-Hamas attacks

FHN November 13, 2023
Cybersecurity researchers have issued a warning about a Windows variant of a malware called BiBi-Windows Wiper. This...
Read More Read more about BiBi-Windows Wiper: Targets Windows in Pro-Hamas attacks
GootBot: New dangerous variant of GootLoader malware 15-768x385
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

GootBot: New dangerous variant of GootLoader malware

FHN November 8, 2023
The latest iteration of GootLoader malware, known as GootBot, enables lateral movement within compromised systems while successfully...
Read More Read more about GootBot: New dangerous variant of GootLoader malware
New Variant of BlueNoroff Malware Targets Mac Users Macbook-illustration
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • MacOS
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

New Variant of BlueNoroff Malware Targets Mac Users

FHN November 8, 2023
“Researchers Discover BlueNoroff RustBucket Malware Variant Targeting MacOS” – A recent report from Jamf Threat Labs sheds...
Read More Read more about New Variant of BlueNoroff Malware Targets Mac Users
SecuriDropper: New DaaS service installs malware on Android android_rafapress_shutterstock
  • BOTNET
  • Compromised
  • cyberattack
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

SecuriDropper: New DaaS service installs malware on Android

FHN November 8, 2023
A recently emerged business offering a “Dropper-as-a-Service” (DaaS) known as “SecuriDropper” bypasses Android’s “Restricted Settings” function to...
Read More Read more about SecuriDropper: New DaaS service installs malware on Android
Mozi malware botnet: Disabled by mysterious kill-switch malware_fire
  • BOTNET
  • Compromised
  • Evilproxy
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Mozi malware botnet: Disabled by mysterious kill-switch

FHN November 3, 2023
The Mozi malware operation came to a sudden halt in August when an unidentified individual delivered a...
Read More Read more about Mozi malware botnet: Disabled by mysterious kill-switch
Arid Viper target Android users with spyware Android Update
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • spyware

Arid Viper target Android users with spyware

FHN October 31, 2023
The hacking group known as Arid Viper (also identified as APT-C-23, Desert Falcon, or TAG-63) is purportedly...
Read More Read more about Arid Viper target Android users with spyware
Malicious NuGet Packages Caught Distributing SeroXen RAT Malware SeroXen-RAT-Delivered-via-Malicious-NuGet
  • Tips
  • BOTNET
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Malicious NuGet Packages Caught Distributing SeroXen RAT Malware

FHN October 31, 2023
Cybersecurity experts have discovered a fresh batch of malicious packages distributed through the NuGet package manager, employing...
Read More Read more about Malicious NuGet Packages Caught Distributing SeroXen RAT Malware
Lazarus hackers targeted a software vendor using known vulnerabilities Kaspersky-Lab-Lazarus-Logo
  • BOTNET
  • Compromised
  • cyberattack
  • Data Breach
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Lazarus hackers targeted a software vendor using known vulnerabilities

FHN October 30, 2023
A recent cyber campaign attributed to the Lazarus hackers from North Korea appears to have focused on...
Read More Read more about Lazarus hackers targeted a software vendor using known vulnerabilities
Critical Vulnerability in F5 BIG-IP Configuration Utility Allows Request Smuggling, Leads to RCE: CVE-2023-46747 f5 BIG-IP
  • BOTNET
  • Compromised
  • cyberattack
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Security Advisory
  • Security Update
  • vulnerability

Critical Vulnerability in F5 BIG-IP Configuration Utility Allows Request Smuggling, Leads to RCE: CVE-2023-46747

FHN October 27, 2023
A critical vulnerability, known as CVE-2023-46747, has been uncovered in F5 BIG-IP products, allowing unauthenticated remote code...
Read More Read more about Critical Vulnerability in F5 BIG-IP Configuration Utility Allows Request Smuggling, Leads to RCE: CVE-2023-46747
Safari Vulnerability Exposes Apple iPhones and Macs Powered by A and M-Series CPUs to Security Risks UZWPUDUD3RGVBNHE7PWXVR2ACY
  • BOTNET
  • Apple
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Safari Vulnerability Exposes Apple iPhones and Macs Powered by A and M-Series CPUs to Security Risks

FHN October 27, 2023
A team of researchers has developed an innovative side-channel attack called iLeakage, which takes advantage of a...
Read More Read more about Safari Vulnerability Exposes Apple iPhones and Macs Powered by A and M-Series CPUs to Security Risks
Backdoor planted on hacked Cisco IOS XE devices altered to evade detection backdoor-malware
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

Backdoor planted on hacked Cisco IOS XE devices altered to evade detection

FHN October 24, 2023
The backdoor infiltrated Cisco devices by exploiting two zero-day flaws in IOS XE software has been altered...
Read More Read more about Backdoor planted on hacked Cisco IOS XE devices altered to evade detection
iOS Zero-Day Attacks: Experts Uncover Deeper Insights into Operation Triangulation pentesting
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

iOS Zero-Day Attacks: Experts Uncover Deeper Insights into Operation Triangulation

FHN October 24, 2023
The TriangleDB implant, designed for infiltrating Apple iOS devices, incorporates four distinct modules: one for capturing audio...
Read More Read more about iOS Zero-Day Attacks: Experts Uncover Deeper Insights into Operation Triangulation
SolarWinds: Serious RCE vulnerabilities discovered Wolff-Jan21WEB
  • Tips
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

SolarWinds: Serious RCE vulnerabilities discovered

FHN October 23, 2023
Security researchers have uncovered three critical remote code execution (RCE) vulnerabilities within the SolarWinds Access Rights Manager...
Read More Read more about SolarWinds: Serious RCE vulnerabilities discovered
Zero-Day Vulnerabilities in Citrix NetScaler and WinRAR Are Under Active Exploitation (CVE-2023-4966, CVE-2023-38831) Cybersecurity and secure nerwork concept. Data protection, gdrp. Glowing futuristic backround with lock on digital integrated circuit.
  • Tips
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Zero-Day Vulnerabilities in Citrix NetScaler and WinRAR Are Under Active Exploitation (CVE-2023-4966, CVE-2023-38831)

FHN October 20, 2023
Threat actors are currently exploiting critical vulnerabilities in Citrix NetScaler and WinRAR, posing a significant risk to...
Read More Read more about Zero-Day Vulnerabilities in Citrix NetScaler and WinRAR Are Under Active Exploitation (CVE-2023-4966, CVE-2023-38831)
SpyNote: Android spyware records your calls Android Update
  • BOTNET
  • Android banking trojan
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • IOC's
  • malicious cyber actors
  • Malware
  • spyware

SpyNote: Android spyware records your calls

FHN October 18, 2023
Security researchers conducted an analysis of the Android trojan called SpyNote, revealing numerous spyware capabilities associated with...
Read More Read more about SpyNote: Android spyware records your calls
Fake browser updates are used to distribute malware HotRat via Cracked Software
  • BOTNET
  • cyberattack
  • Evilproxy
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Fake browser updates are used to distribute malware

FHN October 17, 2023
Cybercriminals are increasingly employing counterfeit browser updates that imitate genuine notifications from Google Chrome, Mozilla Firefox, and...
Read More Read more about Fake browser updates are used to distribute malware
User Submitted Posts: Vulnerability found in WordPress plugin wordpress0-1060x424-1
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • Software Issues

User Submitted Posts: Vulnerability found in WordPress plugin

FHN October 16, 2023
His team at Patch Stack recently uncovered a fresh vulnerability in the WordPress plugin “User Submitted Posts,”...
Read More Read more about User Submitted Posts: Vulnerability found in WordPress plugin
Microsoft: New bug bounty program for AI-powered Bing microsoft-hacked
  • BOTNET
  • Exploitation
  • Internet Security
  • Microsoft
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Microsoft: New bug bounty program for AI-powered Bing

FHN October 16, 2023
Microsoft has unveiled a fresh bug bounty program that centers around enhancing the AI-powered Bing experience, offering...
Read More Read more about Microsoft: New bug bounty program for AI-powered Bing
‘Rapid Reset’ DDoS Attacks Rise: October 2023 Patch Tuesday Has Arrived (CVE-2023-36563, CVE-2023-41763, CVE-2023-44487) Vulnerabilities and Exploits
  • BOTNET
  • Compromised
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

‘Rapid Reset’ DDoS Attacks Rise: October 2023 Patch Tuesday Has Arrived (CVE-2023-36563, CVE-2023-41763, CVE-2023-44487)

FHN October 11, 2023
In October 2023, Microsoft unveiled its latest Patch Tuesday, addressing a comprehensive 103 security vulnerabilities. Within this...
Read More Read more about ‘Rapid Reset’ DDoS Attacks Rise: October 2023 Patch Tuesday Has Arrived (CVE-2023-36563, CVE-2023-41763, CVE-2023-44487)
Google Expands Bug Bounty Program With Chrome, Cloud CTF Events google-chrome-logo-2015_story
  • BOTNET
  • Exploitation
  • google
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Google Expands Bug Bounty Program With Chrome, Cloud CTF Events

FHN October 10, 2023
Google’s research team introduced the v8CTF, a capture-the-flag (CTF) challenge centered around the V8 JavaScript engine used...
Read More Read more about Google Expands Bug Bounty Program With Chrome, Cloud CTF Events
Formbook is a highly prevalent malware strain 1200x800__mainpic_-_2022-10-13T144219.982
  • BOTNET
  • Compromised
  • cyberattack
  • Exploitation
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update
  • Tips

Formbook is a highly prevalent malware strain

FHN October 10, 2023
The September 2023 Global Threat Index from Check Point cybersecurity researchers has unveiled notable shifts in the...
Read More Read more about Formbook is a highly prevalent malware strain
The importance of email marketing for businesses shutterstock_543080893-1
  • Compromised
  • Email servers
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Regulation
  • Security Advisory
  • Security Update
  • Tips

The importance of email marketing for businesses

FHN October 9, 2023
In the contemporary era dominated by technology and social media, email marketing continues to stand out as...
Read More Read more about The importance of email marketing for businesses
Exploits released for Linux flaw giving root on major distros linuxfeatured
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • Linux Malware
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Exploits released for Linux flaw giving root on major distros

FHN October 6, 2023
Online, proof-of-concept exploits have emerged for a critical vulnerability in GNU C Library’s dynamic loader, granting local...
Read More Read more about Exploits released for Linux flaw giving root on major distros
Cisco Releases Urgent Patch to Fix Critical Flaw in Emergency Responder Systems Cisco_Logo
  • BOTNET
  • cisco
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Cisco Releases Urgent Patch to Fix Critical Flaw in Emergency Responder Systems

FHN October 5, 2023
Cisco has issued updates to rectify a critical security vulnerability affecting Emergency Responder, which permits unauthorized remote...
Read More Read more about Cisco Releases Urgent Patch to Fix Critical Flaw in Emergency Responder Systems
Increased number of victims reported to “leak sites” of ransomware gangs Ransomware red button on keyboard, 3D rendering
  • BOTNET
  • Compromised
  • cyberattack
  • Data Breach
  • Evilproxy
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Security Advisory
  • Security Update

Increased number of victims reported to “leak sites” of ransomware gangs

FHN October 5, 2023
According to the “2023 State of the Threat” report by Her Secureworks, the number of victims reported...
Read More Read more about Increased number of victims reported to “leak sites” of ransomware gangs
EvilProxy: Phishing Microsoft 365 via indeed.com open redirect Phishing-Attacks_-Recognize-and-Avoid-Email-Phishing-1
  • Tips
  • BOTNET
  • Compromised
  • Evilproxy
  • Internet Security
  • Microsoft
  • Mobile Security
  • Security Advisory
  • Security Update

EvilProxy: Phishing Microsoft 365 via indeed.com open redirect

FHN October 4, 2023
A recent phishing campaign dubbed “EvilProxy” has come to light, with its sights set on the Microsoft...
Read More Read more about EvilProxy: Phishing Microsoft 365 via indeed.com open redirect
Lazarus hackers breach aerospace company with new LightlessCan malware palo-alto-firewall-migration-app-id-security-tool
  • BOTNET
  • Compromised
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Mobile Security
  • Security Advisory
  • Security Update

Lazarus hackers breach aerospace company with new LightlessCan malware

FHN October 3, 2023
The Lazarus hacking group, associated with North Korea, launched a cyberattack on a Spanish aerospace company by...
Read More Read more about Lazarus hackers breach aerospace company with new LightlessCan malware
Cisco: Prompts administrators to patch an IOS zero-day Cisco Update
  • BOTNET
  • cisco
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Cisco: Prompts administrators to patch an IOS zero-day

FHN September 29, 2023
On Wednesday, Cisco issued a warning to its customers, urging them to address a zero-day vulnerability in...
Read More Read more about Cisco: Prompts administrators to patch an IOS zero-day
Zanubis: The Android banking trojan gets even more dangerous mobile-malware-showcase_image-8-a-8806
  • BOTNET
  • Android banking trojan
  • Backdoor
  • Compromised
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Zanubis: The Android banking trojan gets even more dangerous

FHN September 29, 2023
The Android banking Trojan Zanubis has adopted a new disguise, posing as the official application of the...
Read More Read more about Zanubis: The Android banking trojan gets even more dangerous
Hackers are actively exploiting an Openfire flaw Over-3000-Openfire-servers-vulnerable-to-takover-attacks
  • Exploitation
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

Hackers are actively exploiting an Openfire flaw

FHN September 28, 2023
Malicious actors are actively taking advantage of a critical vulnerability in Openfire messaging servers, using it to...
Read More Read more about Hackers are actively exploiting an Openfire flaw
Researchers uncover a thriving underground economy for malware targeting IoT devices IoT-1
  • BOTNET
  • Evilproxy
  • Exploitation
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Researchers uncover a thriving underground economy for malware targeting IoT devices

FHN September 27, 2023
Researchers have exposed a robust clandestine ecosystem focused on crafting malware for IoT device exploitation. Researchers at...
Read More Read more about Researchers uncover a thriving underground economy for malware targeting IoT devices
ZenRAT Malware Uncovered in Bitwarden Impersonation malware_fire
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

ZenRAT Malware Uncovered in Bitwarden Impersonation

FHN September 27, 2023
A recently discovered malware variant named ZenRAT has surfaced, camouflaged within fraudulent Bitwarden installation bundles. ZenRAT Malware...
Read More Read more about ZenRAT Malware Uncovered in Bitwarden Impersonation
Xenomorph Android malware: Targets users of banks and crypto wallets in the US android_rafapress_shutterstock
  • Tips
  • BOTNET
  • Evilproxy
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Xenomorph Android malware: Targets users of banks and crypto wallets in the US

FHN September 26, 2023
Researchers have uncovered a new distribution campaign for the Xenomorph malware, focusing on Android users in the...
Read More Read more about Xenomorph Android malware: Targets users of banks and crypto wallets in the US
Stealth Falcon hackers are using the new Deadglyph malware bug-virus-malware-freepik
  • BOTNET
  • Backdoor
  • Compromised
  • Darknet
  • Evilproxy
  • Exploitation
  • hackers
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Stealth Falcon hackers are using the new Deadglyph malware

FHN September 25, 2023
A recently discovered backdoor malware, known as “Deadglyph,” has been detected in a cyberattack targeting a government...
Read More Read more about Stealth Falcon hackers are using the new Deadglyph malware
The Rise of Mobile Malware AdobeStock_258121456-1312x702
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

The Rise of Mobile Malware

FHN September 22, 2023
Mobile malware, as its name implies, is specialized malicious software crafted specifically to infiltrate mobile devices such...
Read More Read more about The Rise of Mobile Malware
Fake WinRAR proof-of-concept exploit drops VenomRAT malware WINRAR-1-e1552918131767
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Security Advisory
  • Security Update

Fake WinRAR proof-of-concept exploit drops VenomRAT malware

FHN September 22, 2023
An imitation proof-of-concept (PoC) exploit targeting a WinRAR RCE vulnerability that was recently patched has been discovered...
Read More Read more about Fake WinRAR proof-of-concept exploit drops VenomRAT malware
Mastodon Vulnerabilities and Critical Zero-Day in TrendMicro’s Apex One Addressed: CVE-2023-41179, CVE-2023-42451, CVE-2023-42452 image-security-stack
  • Tips
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Mastodon Vulnerabilities and Critical Zero-Day in TrendMicro’s Apex One Addressed: CVE-2023-41179, CVE-2023-42451, CVE-2023-42452

FHN September 22, 2023
Mastodon has taken action to resolve two vulnerabilities, specifically CVE-2023-42451 and CVE-2023-42452. Additionally, a zero-day vulnerability, denoted...
Read More Read more about Mastodon Vulnerabilities and Critical Zero-Day in TrendMicro’s Apex One Addressed: CVE-2023-41179, CVE-2023-42451, CVE-2023-42452
Nest devices can now only join one speaker group at a time mDW3Lj2XFWRt7LUWkSEosA-1200-80
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Nest devices can now only join one speaker group at a time

FHN September 21, 2023
Google has confirmed that due to a recent court ruling, it is currently not possible to simultaneously...
Read More Read more about Nest devices can now only join one speaker group at a time
Within the Code of a Fresh XWorm Variant Cyber Security Destroyed Concept.padlock Red Open On Electric Ci
  • BOTNET
  • Backdoor
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware

Within the Code of a Fresh XWorm Variant

FHN September 20, 2023
XWorm is a recent addition to the remote access trojan family, quickly establishing itself as one of...
Read More Read more about Within the Code of a Fresh XWorm Variant
The new Android banking trojan is based on ERMAC Android Update
  • Tips
  • Banking Trojan
  • BOTNET
  • Compromised
  • Evilproxy
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

The new Android banking trojan is based on ERMAC

FHN September 20, 2023
A recent analysis of the Android banking trojan Hook has uncovered its foundation in its predecessor, ERMAC....
Read More Read more about The new Android banking trojan is based on ERMAC
Uncommon AWS Services Targeted by New AMBERSQUID Cryptojacking Operation online
  • Compromised
  • BOTNET
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

Uncommon AWS Services Targeted by New AMBERSQUID Cryptojacking Operation

FHN September 18, 2023
An innovative cloud-native cryptojacking campaign has targeted lesser-known Amazon Web Services (AWS) offerings like AWS Amplify, AWS...
Read More Read more about Uncommon AWS Services Targeted by New AMBERSQUID Cryptojacking Operation
LockBit Attack Fails, 3AM Ransomware Steps In as Plan B 3_AM_Ransomware_8a9d4afad0
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Ransomware

LockBit Attack Fails, 3AM Ransomware Steps In as Plan B

FHN September 18, 2023
Researchers have recently uncovered a novel ransomware variant known as 3AM. Their inquiry unveiled that the initial...
Read More Read more about LockBit Attack Fails, 3AM Ransomware Steps In as Plan B
Free Download Manager site has been redirecting Linux users to malware for years ChatGPT Protection concept: computer keyboard with Closed Padlock
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Free Download Manager site has been redirecting Linux users to malware for years ChatGPT

FHN September 12, 2023
The Free Download Manager website has been consistently redirecting Linux users to malware-infected destinations over an extended...
Read More Read more about Free Download Manager site has been redirecting Linux users to malware for years ChatGPT
Notepad++ 8.5.7 addresses critical security vulnerabilities about-notepad-plus-plus_thumb-3mxfu-rs-wX-700-hX-400
  • BOTNET
  • Compromised
  • cyberattack
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Notepad++ 8.5.7 addresses critical security vulnerabilities

FHN September 12, 2023
“The latest release, Notepad++ version 8.5.7, includes security updates to address several buffer overflow vulnerabilities identified in...
Read More Read more about Notepad++ 8.5.7 addresses critical security vulnerabilities
A Modular Malware Loader, HijackLoader, Gaining Prominence in the World of Cybercrime malware_shutterstock_161824667-e1464081126105-1280x720
  • BOTNET
  • Compromised
  • cyberattack
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

A Modular Malware Loader, HijackLoader, Gaining Prominence in the World of Cybercrime

FHN September 12, 2023
“HijackLoader, a recently emerged malware loader, is rapidly gaining popularity within the cybercriminal community for distributing a...
Read More Read more about A Modular Malware Loader, HijackLoader, Gaining Prominence in the World of Cybercrime
How to make sure you don’t lose important emails in Gmail Gmail-is-renewed-and-these-are-the-two-ways-to
  • google
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

How to make sure you don’t lose important emails in Gmail

FHN September 11, 2023
Secure Entry in Gmail is a crucial mode that enables users to safeguard against missing essential emails....
Read More Read more about How to make sure you don’t lose important emails in Gmail
Akira Ransomware Attacks Exploit Zero-Day Cisco ASA Vulnerability cisco
  • cisco
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability
  • Zero Day Attack

Akira Ransomware Attacks Exploit Zero-Day Cisco ASA Vulnerability

FHN September 11, 2023
In recent updates, there have been emerging reports about threat actors associated with the Akira ransomware focusing...
Read More Read more about Akira Ransomware Attacks Exploit Zero-Day Cisco ASA Vulnerability
Alert for Mac Users: A Malvertising Campaign spreads Atomic Stealer macOS Malware xXaZ3Lb4ZEejUv9ipwK3ha
  • BOTNET
  • Evilproxy
  • Exploitation
  • infostealer
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Alert for Mac Users: A Malvertising Campaign spreads Atomic Stealer macOS Malware

FHN September 8, 2023
A fresh malvertising campaign has come to light, disseminating an updated variant of macOS stealer malware known...
Read More Read more about Alert for Mac Users: A Malvertising Campaign spreads Atomic Stealer macOS Malware
Mirai botnet: New version financially infects Android TV boxes VecUhPthaRZVrd2j2NVLSD-1200-80
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security

Mirai botnet: New version financially infects Android TV boxes

FHN September 8, 2023
A recently updated variant of the Mirai botnet malware is now targeting Android TV set-top boxes, which...
Read More Read more about Mirai botnet: New version financially infects Android TV boxes
A new Python variant of the Chaes Malware is focusing on the banking and logistics sectors. malware
  • Data Breach
  • BOTNET
  • Compromised
  • Exploitation
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

A new Python variant of the Chaes Malware is focusing on the banking and logistics sectors.

FHN September 7, 2023
The banking and logistics sectors are currently facing an assault from an updated version of malware known...
Read More Read more about A new Python variant of the Chaes Malware is focusing on the banking and logistics sectors.
Zero-Day Alert: Latest Android Patch Update Addresses Actively Exploited Vulnerability with New Fix 7_In-this-photo-illustration-a-Android-logo-seen-displayed-on
  • google
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability
  • Zero Day Attack

Zero-Day Alert: Latest Android Patch Update Addresses Actively Exploited Vulnerability with New Fix

FHN September 6, 2023
Google has released its monthly security patches for Android to tackle various vulnerabilities, one of which is...
Read More Read more about Zero-Day Alert: Latest Android Patch Update Addresses Actively Exploited Vulnerability with New Fix
Recent BLISTER Malware Update Boosting Stealthy Network Intrusion New-Android-malware-uses-OCR-to-steal-credentials-from-images
  • Compromised
  • BOTNET
  • Exploitation
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Recent BLISTER Malware Update Boosting Stealthy Network Intrusion

FHN September 5, 2023
“In the ongoing SocGholish infection chains, a revised BLISTER malware loader is now deployed to distribute Mythic,...
Read More Read more about Recent BLISTER Malware Update Boosting Stealthy Network Intrusion
VIPRE research on spam and phishing emails Phishing-Attacks-That-Can-Impact-Your-Business-image
  • Tips
  • Compromised
  • malicious cyber actors
  • phishing
  • Security Advisory
  • Security Update
  • Spam

VIPRE research on spam and phishing emails

FHN September 5, 2023
Based on a report from VIPRE, the use of malicious links in phishing emails reached 85%, and...
Read More Read more about VIPRE research on spam and phishing emails
Reported ransomware attacks have targeted LogicMonitor customers, leading to security breaches LogicMonitor
  • Compromised
  • BOTNET
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Reported ransomware attacks have targeted LogicMonitor customers, leading to security breaches

FHN September 4, 2023
Today, LogicMonitor, a network monitoring company, confirmed that certain users of its SaaS platform have been impacted...
Read More Read more about Reported ransomware attacks have targeted LogicMonitor customers, leading to security breaches
Chinese APT Uses Fake Messenger Apps to Spy on Android Users Hack alarm shutterstock_1918152971
  • Exploitation
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • spyware

Chinese APT Uses Fake Messenger Apps to Spy on Android Users

FHN September 1, 2023
In the coming years, Signal’s applications became compromised, while Telegram, containing the BadBazaar spyware, was uploaded to...
Read More Read more about Chinese APT Uses Fake Messenger Apps to Spy on Android Users
DarkGate malware activity is increasing malware-malvertising-sensorstechforum
  • BOTNET
  • Compromised
  • cyberattack
  • Darknet
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

DarkGate malware activity is increasing

FHN September 1, 2023
A recently detected malspam campaign has been identified as distributing a readily available malware known as DarkGate....
Read More Read more about DarkGate malware activity is increasing
The emerging ransomware collective “Ransomed” has adopted a novel extortion strategy. IS-15716_Zerto9_Ransomware_450_300_blog
  • Tips
  • Compromised
  • Evilproxy
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

The emerging ransomware collective “Ransomed” has adopted a novel extortion strategy.

FHN August 31, 2023
Dubbed “Ransomed,” this group was initially identified by cybersecurity analyst and blogger Flashpoint on August 15th. The...
Read More Read more about The emerging ransomware collective “Ransomed” has adopted a novel extortion strategy.
A Single-Click Security Vulnerability Found in Zimbra Collaboration Suite: CVE-2023-41106 zimbra-logo
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

A Single-Click Security Vulnerability Found in Zimbra Collaboration Suite: CVE-2023-41106

FHN August 29, 2023
Within the realm of digital communication and collaboration, the Zimbra Collaboration Suite has long stood as a...
Read More Read more about A Single-Click Security Vulnerability Found in Zimbra Collaboration Suite: CVE-2023-41106
ALPHV ransomware: New data leak API as a new extortion strategy Ransomware-Report-Photo
  • BOTNET
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

ALPHV ransomware: New data leak API as a new extortion strategy

FHN August 28, 2023
The ALPHV ransomware group, known as BlackCat, aims to intensify ransom payment pressure on victims by offering...
Read More Read more about ALPHV ransomware: New data leak API as a new extortion strategy
NEW STUDY SHEDS LIGHT ON ADHUBLLKA RANSOMWARE NETWORK cybersecurity4
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update

NEW STUDY SHEDS LIGHT ON ADHUBLLKA RANSOMWARE NETWORK

FHN August 28, 2023
Cybersecurity analysts have revealed an intricate network of interconnected ransomware variants, all of which can be traced...
Read More Read more about NEW STUDY SHEDS LIGHT ON ADHUBLLKA RANSOMWARE NETWORK
Roblox Game Developers Facing Threat from Over a Dozen Malicious npm Packages warning-cybersecurity-types-of-cyber-attacks
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Roblox Game Developers Facing Threat from Over a Dozen Malicious npm Packages

FHN August 24, 2023
Since the beginning of August 2023, over twelve malicious packages have been found in the npm package...
Read More Read more about Roblox Game Developers Facing Threat from Over a Dozen Malicious npm Packages
Scarab Ransomware Deployed Worldwide Via Spacecolon Toolset ulnerabilidades_Header
  • Compromised
  • cyberattack
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

Scarab Ransomware Deployed Worldwide Via Spacecolon Toolset

FHN August 24, 2023
“Cybersecurity experts at ESET reveal the discovery of a malevolent toolkit called Spacecolon, which has been utilized...
Read More Read more about Scarab Ransomware Deployed Worldwide Via Spacecolon Toolset
New variant of XLoader macOS Malware masquerading as OfficeNote app DDOS_Attacks-What_How_and_the_Emergence_of_AI-powered_DDoS_Blog_Featured_Image-scaled
  • BOTNET
  • Compromised
  • cyberattack
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update

New variant of XLoader macOS Malware masquerading as OfficeNote app

FHN August 23, 2023
A fresh iteration of the XLoader malware targeting macOS disguises itself under the name ‘OfficeNote’ productivity application....
Read More Read more about New variant of XLoader macOS Malware masquerading as OfficeNote app
Chinese Hackers Using Stolen Ivacy VPN Certificate To Sign Malware warning-cybersecurity-types-of-cyber-attacks
  • Tips
  • Compromised
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Chinese Hackers Using Stolen Ivacy VPN Certificate To Sign Malware

FHN August 22, 2023
The Bronze Starlight hacking group has ingeniously employed a legitimate Ivacy VPN code-signing certificate to focus on...
Read More Read more about Chinese Hackers Using Stolen Ivacy VPN Certificate To Sign Malware
Hackers Can Exploit New WinRAR Vulnerability to Gain PC Control WINRAR-1-e1552918131767
  • vulnerability
  • Exploitation
  • Internet Security
  • Remote code execution
  • Security Advisory
  • Security Update

Hackers Can Exploit New WinRAR Vulnerability to Gain PC Control

FHN August 21, 2023
A security vulnerability of significant severity has been revealed in the WinRAR utility, posing a potential risk...
Read More Read more about Hackers Can Exploit New WinRAR Vulnerability to Gain PC Control
BlackCat’s Sphynx ransomware integrates Impacket, RemCom BlackCat
  • Compromised
  • BOTNET
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Ransomware
  • Security Advisory
  • Security Update
  • Tips

BlackCat’s Sphynx ransomware integrates Impacket, RemCom

FHN August 21, 2023
A new iteration of the BlackCat ransomware was recently unveiled by Microsoft’s researchers. Termed ‘Sphynx’, this variant...
Read More Read more about BlackCat’s Sphynx ransomware integrates Impacket, RemCom
Researchers Detect Vulnerabilities in PowerShell Gallery Enabling Supply Chain Attacks Vulnerabilities and Exploits
  • Tips
  • Backdoor
  • BOTNET
  • Compromised
  • cyberattack
  • Darknet
  • Data Breach
  • Evilproxy
  • Exploitation
  • hackers
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update
  • Software Issues

Researchers Detect Vulnerabilities in PowerShell Gallery Enabling Supply Chain Attacks

FHN August 17, 2023
Malicious actors could exploit existing vulnerabilities within the PowerShell Gallery to execute supply chain attacks targeting users...
Read More Read more about Researchers Detect Vulnerabilities in PowerShell Gallery Enabling Supply Chain Attacks
Ivanti Avalanche Critical Buffer Overflow Vulnerabilities: CVE-2023-32560 mise-en-garde-contre-le-cybersecurite
  • Compromised
  • cyberattack
  • Data Breach
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Ivanti Avalanche Critical Buffer Overflow Vulnerabilities: CVE-2023-32560

FHN August 16, 2023
Two significant security flaws, designated as CVE-2023-32560, have been unearthed in Ivanti Avalanche. This enterprise mobility management...
Read More Read more about Ivanti Avalanche Critical Buffer Overflow Vulnerabilities: CVE-2023-32560
MaginotDNS: DNS cache poisoning attacks DNS ddos attack
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

MaginotDNS: DNS cache poisoning attacks

FHN August 15, 2023
Researchers from UC Irvine and Tsinghua University have created a potent cache poisoning attack named “MaginotDNS.” This...
Read More Read more about MaginotDNS: DNS cache poisoning attacks
Gafgyt: Exploits five year old flaw in EoL Zyxel DDOS_Attacks-What_How_and_the_Emergence_of_AI-powered_DDoS_Blog_Featured_Image-scaled
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Targeted Attacks
  • vulnerability

Gafgyt: Exploits five year old flaw in EoL Zyxel

FHN August 14, 2023
Fortinet has raised an alert regarding the Gafgyt botnet malware, which is currently targeting a vulnerability in...
Read More Read more about Gafgyt: Exploits five year old flaw in EoL Zyxel
Lapsus$: How They Hacked Some of the Biggest Targets ICS-vulnerabilities-cybersecurity-feature-May-9-2022-web
  • BOTNET
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Targeted Attacks
  • Tips

Lapsus$: How They Hacked Some of the Biggest Targets

FHN August 14, 2023
The amateur hacker group Lapsus$—mostly teenagers with limited technical training—has skillfully breached major targets like Microsoft, Okta,...
Read More Read more about Lapsus$: How They Hacked Some of the Biggest Targets
Microsoft Patch Tuesday August: Warns of 2 zero-days Microsoft Tuesday Patch
  • Tips
  • BOTNET
  • Evilproxy
  • Internet Security
  • Microsoft
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability

Microsoft Patch Tuesday August: Warns of 2 zero-days

FHN August 10, 2023
Microsoft introduces the August 2023 Patch Tuesday update, encompassing 87 security enhancements addressing 23 vulnerabilities. Among these...
Read More Read more about Microsoft Patch Tuesday August: Warns of 2 zero-days
Suspected Vietnamese hacker targets Chinese, Bulgarian organizations with new ransomware ransomware-warning-360x194
  • Data Breach
  • Compromised
  • cyberattack
  • Darknet
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Ransomware
  • Security Advisory
  • Security Update

Suspected Vietnamese hacker targets Chinese, Bulgarian organizations with new ransomware

FHN August 8, 2023
Since June 4, 2023, an unidentified threat actor has been employing a Yashma ransomware variant to target...
Read More Read more about Suspected Vietnamese hacker targets Chinese, Bulgarian organizations with new ransomware
QakBot Malware Operators Ramp Up C2 Network with 15 New Servers Qakbot_blog_new
  • BOTNET
  • Backdoor
  • Compromised
  • cyberattack
  • Data Breach
  • Evilproxy
  • Exploitation
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Software Issues
  • Targeted Attacks
  • Tips

QakBot Malware Operators Ramp Up C2 Network with 15 New Servers

FHN August 8, 2023
As of late June 2023, the QakBot (aka QBot) malware operators have established 15 new command-and-control (C2)...
Read More Read more about QakBot Malware Operators Ramp Up C2 Network with 15 New Servers
“Critical Remote Code Execution (RCE) Vulnerability (CVE-2023-39143) in PaperCut Application Servers” papercut-650
  • BOTNET
  • Compromised
  • cyberattack
  • Darknet
  • Data Breach
  • Evilproxy
  • Exploitation
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

“Critical Remote Code Execution (RCE) Vulnerability (CVE-2023-39143) in PaperCut Application Servers”

FHN August 8, 2023
PaperCut NG and PaperCut MF are widely adopted software solutions for managing print services on servers. CVE-2023-39143...
Read More Read more about “Critical Remote Code Execution (RCE) Vulnerability (CVE-2023-39143) in PaperCut Application Servers”
Critical Microsoft Power Platform Vulnerability: Proactive Security Methods to Prevent Exploitation unlocked-lock-1
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Microsoft
  • Mobile Security
  • Security Advisory
  • Security Update

Critical Microsoft Power Platform Vulnerability: Proactive Security Methods to Prevent Exploitation

FHN August 7, 2023
Microsoft addressed a critical vulnerability in its Power Platform after criticism for a delayed response. Tenable reported...
Read More Read more about Critical Microsoft Power Platform Vulnerability: Proactive Security Methods to Prevent Exploitation
Fake VMware vConnector package detected in PyPI vmware-logo-line
  • BOTNET
  • Compromised
  • Data Breach
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Fake VMware vConnector package detected in PyPI

FHN August 7, 2023
IT professionals were targeted by a malicious package named “VMConnect,” which impersonated the VMware vSphere connector module...
Read More Read more about Fake VMware vConnector package detected in PyPI
Malicious apps employ sneaky versioning techniques to evade detection by Google Play Store scanners. 1555478944_google_play_store_budgeting_story
  • BOTNET
  • Compromised
  • Data Breach
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Malicious apps employ sneaky versioning techniques to evade detection by Google Play Store scanners.

FHN August 4, 2023
Threat actors use versioning to bypass Google Play Store’s malware detection and target Android users. In its...
Read More Read more about Malicious apps employ sneaky versioning techniques to evade detection by Google Play Store scanners.
NodeStealer 2.0 takes over Facebook Business accounts and targets crypto wallets palo-alto-firewall-migration-app-id-security-tool
  • Evilproxy
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

NodeStealer 2.0 takes over Facebook Business accounts and targets crypto wallets

FHN August 3, 2023
Palo Alto Networks Unit 42 found a new phishing campaign distributing a Python variant of NodeStealer. The...
Read More Read more about NodeStealer 2.0 takes over Facebook Business accounts and targets crypto wallets
A new attack significantly affects AI chatbots tr-edge-ai1-770x567
  • BOTNET
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

A new attack significantly affects AI chatbots

FHN August 2, 2023
The Chat GPT and other AI models have undergone numerous modifications to prevent malicious users from exploiting...
Read More Read more about A new attack significantly affects AI chatbots
Fruity Trojan: Uses deceptive software installers to spread the Remcos RAT shutterstock_248596786
  • BOTNET
  • Backdoor
  • Compromised
  • Data Breach
  • Exploitation
  • infostealer
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Fruity Trojan: Uses deceptive software installers to spread the Remcos RAT

FHN August 1, 2023
Cybercriminals are fabricating counterfeit websites containing software installers that have been infected with a downloader malware named...
Read More Read more about Fruity Trojan: Uses deceptive software installers to spread the Remcos RAT
Flipper Zero: Now has an app store for third-party applications flipper-1
  • BOTNET
  • Compromised
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Flipper Zero: Now has an app store for third-party applications

FHN July 31, 2023
The Flipper Zero team recently introduced “Flipper Apps,” its very own mobile app store. This new store...
Read More Read more about Flipper Zero: Now has an app store for third-party applications
WordPress Ninja Forms: Flaw in plugin allows data theft wordpress0-1060x424-1
  • Tips
  • BOTNET
  • Compromised
  • Data Breach
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability
  • wordpress

WordPress Ninja Forms: Flaw in plugin allows data theft

FHN July 31, 2023
The renowned WordPress form plugin, Ninja Forms, has been identified to have three vulnerabilities that might grant...
Read More Read more about WordPress Ninja Forms: Flaw in plugin allows data theft
Lazarus: They hijack Microsoft’s IIS servers to distribute malware smartphone malware concept. 3d render.
  • Compromised
  • Backdoor
  • BOTNET
  • cyberattack
  • Evilproxy
  • Exploitation
  • hackers
  • infostealer
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update
  • windows

Lazarus: They hijack Microsoft’s IIS servers to distribute malware

FHN July 27, 2023
Lazarus, a state-backed North Korean hacker group, targets Windows Internet Information Service (IIS) web servers to use...
Read More Read more about Lazarus: They hijack Microsoft’s IIS servers to distribute malware
Azimut: Italian Asset Manager victim of ransomware attack image-security-stack
  • Compromised
  • cyberattack
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Ransomware
  • Security Advisory
  • Security Update

Azimut: Italian Asset Manager victim of ransomware attack

FHN July 27, 2023
Azimuth Group, an Italian asset management company, oversees a substantial portfolio of over $87.2 billion in assets....
Read More Read more about Azimut: Italian Asset Manager victim of ransomware attack
Microsoft: Stolen key gave access to cloud services microsoft-hacked
  • Compromised
  • cyberattack
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Microsoft
  • Security Advisory
  • Security Update
  • Targeted Attacks

Microsoft: Stolen key gave access to cloud services

FHN July 26, 2023
Wiz security researchers have revealed that Chinese hackers, known as Storm-0558, successfully stole Microsoft’s consumer signing key....
Read More Read more about Microsoft: Stolen key gave access to cloud services
Estée Lauder: Hacked by two ransomware gangs unsecured-estee-lauder-database-exposed-440-million-records-showcase_image-3-a-13712
  • Tips
  • BOTNET
  • Compromised
  • Evilproxy
  • Internet Security
  • Security Advisory
  • Security Update

Estée Lauder: Hacked by two ransomware gangs

FHN July 25, 2023
Estee Lauder has recently experienced a significant ransomware breach, joining the list of prominent companies targeted by...
Read More Read more about Estée Lauder: Hacked by two ransomware gangs
Mallox ransomware exploits weak MS-SQL servers to breach networks Mallox-Ransomware-Exploits-Weak-MS-SQL-Servers-to-Breach-Networks
  • Tips
  • BOTNET
  • cyberattack
  • Evilproxy
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Security Advisory
  • Security Update

Mallox ransomware exploits weak MS-SQL servers to breach networks

FHN July 24, 2023
New findings from Palo Alto Networks Unit 42 reveal that in 2023, Mallox ransomware activities have surged...
Read More Read more about Mallox ransomware exploits weak MS-SQL servers to breach networks
BundleBot malware steals sensitive information malware
  • BOTNET
  • Compromised
  • cyberattack
  • Darknet
  • Evilproxy
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

BundleBot malware steals sensitive information

FHN July 24, 2023
The cybersecurity landscape has been recently shaken by the emergence of BundleBot, a sophisticated malware strain that...
Read More Read more about BundleBot malware steals sensitive information
Adobe: Urgent patch fixes ColdFusion zero-day Adobe_Cold_Fusion_b03bbf9b52
  • Exploitation
  • Compromised
  • Evilproxy
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Adobe: Urgent patch fixes ColdFusion zero-day

FHN July 22, 2023
Adobe has addressed three vulnerabilities in ColdFusion, including a zero-day vulnerability. Adobe fixed three vulnerabilities in ColdFusion,...
Read More Read more about Adobe: Urgent patch fixes ColdFusion zero-day
“Blackhat AI Module ‘WormGPT’ Attracts 5,000 Subscribers in a Few Days” Vulnerability-Management-Program-Best-Practices-1
  • Compromised
  • BOTNET
  • cyberattack
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Security Advisory
  • Security Update

“Blackhat AI Module ‘WormGPT’ Attracts 5,000 Subscribers in a Few Days”

FHN July 20, 2023
Artificial Intelligence (AI) has introduced revolutionary advances, including generative AI, which shows great potential for creative use....
Read More Read more about “Blackhat AI Module ‘WormGPT’ Attracts 5,000 Subscribers in a Few Days”
Turla: Targets Exchange servers with new DeliveryCheck backdoor malware exchange-p3yc87bx1i3os8vecr7lc8okxfmr6yvksxpd2d9zcg
  • Exploitation
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Turla: Targets Exchange servers with new DeliveryCheck backdoor malware

FHN July 20, 2023
Microsoft and the Ukrainian CERT issued a warning about Russian state hacking group Turla launching new attacks....
Read More Read more about Turla: Targets Exchange servers with new DeliveryCheck backdoor malware
Critical and High Vulnerabilities in Citrix ADC and Citrix Gateway (CVE-2023-3519, CVE-2023-3466, CVE-2023-3467) citrix1
  • BOTNET
  • Compromised
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Critical and High Vulnerabilities in Citrix ADC and Citrix Gateway (CVE-2023-3519, CVE-2023-3466, CVE-2023-3467)

FHN July 19, 2023
Citrix ADC and Citrix Gateway, renowned for their role in facilitating secure application delivery and remote access...
Read More Read more about Critical and High Vulnerabilities in Citrix ADC and Citrix Gateway (CVE-2023-3519, CVE-2023-3466, CVE-2023-3467)
AVrecon malware infects 70.000 Linux routers to create botnet 469ABCAA-D69A-4ED1-AC06-6EC19E544AC9
  • BOTNET
  • Compromised
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • Linux Malware
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

AVrecon malware infects 70.000 Linux routers to create botnet

FHN July 18, 2023
AVrecon malware infects 70,000 Linux routers, forming a botnet for bandwidth theft and a hidden residential proxy...
Read More Read more about AVrecon malware infects 70.000 Linux routers to create botnet
Gamaredon hackers steal data in less than an hour after the breach cyber-security-freepik-5
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

Gamaredon hackers steal data in less than an hour after the breach

FHN July 18, 2023
The Computer Emergency Response Team (CERT-UA) of Ukraine has issued a warning regarding the rapid actions of...
Read More Read more about Gamaredon hackers steal data in less than an hour after the breach
Zimbra to admins: Manually patch this zero-day vulnerability zimbra
  • Tips
  • Backdoor
  • BOTNET
  • Compromised
  • cyberattack
  • Data Breach
  • Evilproxy
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Zimbra to admins: Manually patch this zero-day vulnerability

FHN July 17, 2023
Zimbra Collaboration Suite (ZCS) has issued an urgent advisory, urging administrators to apply a manual patch for...
Read More Read more about Zimbra to admins: Manually patch this zero-day vulnerability
Fake PoC for a Linux Kernel vulnerability on GitHub contains malware mise-en-garde-contre-le-cybersecurite
  • Exploitation
  • Backdoor
  • BOTNET
  • Compromised
  • cyberattack
  • Data Breach
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Fake PoC for a Linux Kernel vulnerability on GitHub contains malware

FHN July 14, 2023
A fake PoC about a Linux kernel vulnerability on GitHub exposed researchers to malware. A backdoor with...
Read More Read more about Fake PoC for a Linux Kernel vulnerability on GitHub contains malware
Triada Malware: Infects Android devices via fake Telegram app android_api
  • BOTNET
  • Backdoor
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Triada Malware: Infects Android devices via fake Telegram app

FHN July 13, 2023
The Triada malware infiltrates Android devices through a counterfeit Telegram app. Thankfully, the version of Telegram infected...
Read More Read more about Triada Malware: Infects Android devices via fake Telegram app
Critical Auth Bypass Vulnerabilities: SonicWall Urges Immediate Patching for GMS/Analytics asset_upload_file64036_233168
  • Compromised
  • BOTNET
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

Critical Auth Bypass Vulnerabilities: SonicWall Urges Immediate Patching for GMS/Analytics

FHN July 13, 2023
SonicWall has issued an urgent warning to its customers, urging them to promptly patch several critical vulnerabilities...
Read More Read more about Critical Auth Bypass Vulnerabilities: SonicWall Urges Immediate Patching for GMS/Analytics
Microsoft’s July 2023 Patch Tuesday Fixes Five Zero-Days, Nine Critical Vulnerabilities Microsoft
  • Exploitation
  • Evilproxy
  • Microsoft
  • Security Advisory
  • Security Update
  • vulnerability
  • Zero Day Attack

Microsoft’s July 2023 Patch Tuesday Fixes Five Zero-Days, Nine Critical Vulnerabilities

FHN July 12, 2023
Today, Microsoft Corp. released software updates to address a total of 130 security vulnerabilities in its Windows...
Read More Read more about Microsoft’s July 2023 Patch Tuesday Fixes Five Zero-Days, Nine Critical Vulnerabilities
Critical RCE Vulnerability in ShareFile: PoC Exploit Available Vulnerabilities and Exploits
  • Exploitation
  • Citrix
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Critical RCE Vulnerability in ShareFile: PoC Exploit Available

FHN July 11, 2023
Recently, a critical vulnerability was discovered in ShareFile, a cloud-based file sharing application. This vulnerability, identified as...
Read More Read more about Critical RCE Vulnerability in ShareFile: PoC Exploit Available
MOVEit Transfer customers are being warned to fix a new, critical flaw MOVEit-Transfer-vulnerability
  • Exploitation
  • Backdoor
  • Banking Trojan
  • cyberattack
  • Evilproxy
  • hackers
  • Internet Security
  • IOC's
  • Linux Malware
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update
  • Software Issues

MOVEit Transfer customers are being warned to fix a new, critical flaw

FHN July 10, 2023
Progress is notifying customers about a newly discovered critical SQL injection vulnerability, identified as CVE-2023-36934, in its...
Read More Read more about MOVEit Transfer customers are being warned to fix a new, critical flaw
Rekoobe Malware: Targets vulnerable Linux servers Linux-malware-Symbiote
  • Exploitation
  • Backdoor
  • cyberattack
  • Evilproxy
  • Internet Security
  • IOC's
  • Linux Malware
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Rekoobe Malware: Targets vulnerable Linux servers

FHN July 7, 2023
Rekoobe, a backdoor malware, specifically targets vulnerable Linux servers commonly utilized by the Chinese APT31. Rekoobe Malware...
Read More Read more about Rekoobe Malware: Targets vulnerable Linux servers
Microsoft Teams: The TeamsPhisher tool exploits its bug Microsoft
  • Exploitation
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Microsoft
  • Mobile Security
  • phishing
  • Security Advisory
  • Security Update

Microsoft Teams: The TeamsPhisher tool exploits its bug

FHN July 7, 2023
The “TeamsPhisher” cybersecurity tool provides a means for both pen testers and malicious actors to send harmful...
Read More Read more about Microsoft Teams: The TeamsPhisher tool exploits its bug
New StackRot Linux kernel flaw allows privilege escalation linux-kernel-double-free-vulnerability
  • Exploitation
  • cyberattack
  • Evilproxy
  • Internet Security
  • IOC's
  • Linux Malware
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update
  • vulnerability

New StackRot Linux kernel flaw allows privilege escalation

FHN July 6, 2023
Recent reports have brought to light crucial technical details regarding a critical vulnerability impacting various versions of...
Read More Read more about New StackRot Linux kernel flaw allows privilege escalation
DDoSia Attack Tool Upgraded with Encryption, Concealed Targeting encryption
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

DDoSia Attack Tool Upgraded with Encryption, Concealed Targeting

FHN July 5, 2023
A new version of the DDoSia attack tool has been released by the threat actors, featuring an...
Read More Read more about DDoSia Attack Tool Upgraded with Encryption, Concealed Targeting
WordPress plugin gives hackers admin access to your site wordpress0-1060x424-1
  • Tips
  • Backdoor
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • wordpress

WordPress plugin gives hackers admin access to your site

FHN July 4, 2023
A vulnerability found in the Ultimate Member plugin has the potential to exploit thousands of WordPress sites,...
Read More Read more about WordPress plugin gives hackers admin access to your site
BlackCat Ransomware Gang to Launch Malicious WinSCP Ads Untitled-design-7
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

BlackCat Ransomware Gang to Launch Malicious WinSCP Ads

FHN July 3, 2023
The BlackCat ransomware group launched a malvertising campaign to push Cobalt Strike. They put up advertisements to...
Read More Read more about BlackCat Ransomware Gang to Launch Malicious WinSCP Ads
Modified Telegram app with malware that puts your data at risk found Telegram (1)1688129037778
  • BOTNET
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

Modified Telegram app with malware that puts your data at risk found

FHN July 3, 2023
Cybersecurity researchers recently uncovered a concerning discovery regarding a modified iteration of the widely-used messaging application, Telegram,...
Read More Read more about Modified Telegram app with malware that puts your data at risk found
New Malware by Lazarus-Backed Andariel Group Exploits Log4j Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
  • BOTNET
  • Compromised
  • cyberattack
  • Data Breach
  • Evilproxy
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware

New Malware by Lazarus-Backed Andariel Group Exploits Log4j

FHN July 2, 2023
Last year, the North Korean hacking group Andariel utilized a previously undisclosed malware named EarlyRat to carry...
Read More Read more about New Malware by Lazarus-Backed Andariel Group Exploits Log4j
Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data ThirdEye - A new Infostealer Malware Steal BIOS & Hardware Data
  • BOTNET
  • Compromised
  • Data Breach
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data

FHN July 1, 2023
Security researchers have recently discovered ThirdEye, an information stealer designed for Windows operating systems. This stealthy malware...
Read More Read more about Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data
Android malware Fluhorse targets credit cards marcher-malware-android-security
  • BOTNET
  • Compromised
  • Data Breach
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Tips

Android malware Fluhorse targets credit cards

FHN July 1, 2023
Cybersecurity experts have recently disclosed the intricate workings of Fluhorse, an Android malware family. The malware “represents...
Read More Read more about Android malware Fluhorse targets credit cards
Akira ransomware: Linux version targets VMware ESXi servers xXaZ3Lb4ZEejUv9ipwK3ha
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • Ransomware
  • Security Advisory
  • Security Update

Akira ransomware: Linux version targets VMware ESXi servers

FHN June 29, 2023
Akira, a ransomware operation, has recently shifted its focus from Windows systems to VMware ESXi virtual machines,...
Read More Read more about Akira ransomware: Linux version targets VMware ESXi servers
Arcserve: Fixed critical vulnerability in UDP software 1667551751_arcserve-udp3
  • Tips
  • BOTNET
  • Compromised
  • Data Breach
  • Evilproxy
  • Internet Security
  • Security Advisory
  • Security Update

Arcserve: Fixed critical vulnerability in UDP software

FHN June 29, 2023
Arcserve has recently launched a security update to resolve a severe authentication bypass vulnerability known as CVE-2023-26258,...
Read More Read more about Arcserve: Fixed critical vulnerability in UDP software
Windows malware spreads through infected Super Mario game Super_Mario_Run_header.0
  • BOTNET
  • Evilproxy
  • Exploitation
  • Internet Security
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update
  • windows

Windows malware spreads through infected Super Mario game

FHN June 27, 2023
A trojanized installer for the popular Super Mario 3: Mario Forever game for Windows has been discovered,...
Read More Read more about Windows malware spreads through infected Super Mario game
Vulnerabilities Identified and Patched in BIND 9 DNS Software dns
  • vulnerability
  • Internet Security
  • malicious cyber actors
  • Malware
  • Security Advisory
  • Security Update

Vulnerabilities Identified and Patched in BIND 9 DNS Software

FHN June 27, 2023
The BIND 9 DNS software suite, an integral part of the Domain Name System (DNS), has recently...
Read More Read more about Vulnerabilities Identified and Patched in BIND 9 DNS Software
Powerful JavaScript Dropper PindOS distributes Bumblebee and IcedID malware keyboard with red enter key malware
  • BOTNET
  • Backdoor
  • Compromised
  • cyberattack
  • Darknet
  • Data Breach
  • Exploitation
  • hackers
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Powerful JavaScript Dropper PindOS distributes Bumblebee and IcedID malware

FHN June 26, 2023
A new strain of the JavaScript dropper has been observed delivering next-stage payloads such as Bumblebee and...
Read More Read more about Powerful JavaScript Dropper PindOS distributes Bumblebee and IcedID malware
The IDOR Vulnerability in Microsoft Teams 0816vrm_Infrastruggle
  • vulnerability
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malware
  • Microsoft
  • Security Advisory
  • Security Update
  • Tips

The IDOR Vulnerability in Microsoft Teams

FHN June 26, 2023
Cybersecurity researchers have recently informed that a vulnerability in the latest version of Microsoft Teams allows attackers to inject...
Read More Read more about The IDOR Vulnerability in Microsoft Teams
Chinese APT15 hackers use new Graphican backdoor UZWPUDUD3RGVBNHE7PWXVR2ACY
  • BOTNET
  • Backdoor
  • Compromised
  • cyberattack
  • Evilproxy
  • Exploitation
  • hackers
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Chinese APT15 hackers use new Graphican backdoor

FHN June 22, 2023
The Chinese hackers which are tracked as APT15 are involved in a new campaign that uses a backdoor with the name “Graphican“. The...
Read More Read more about Chinese APT15 hackers use new Graphican backdoor
Android malware GravityRAT steals your WhatsApp backups MalwareAndroid_720
  • BOTNET
  • Evilproxy
  • Exploitation
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update

Android malware GravityRAT steals your WhatsApp backups

FHN June 22, 2023
ESET researchers have identified an updated version of Android GravityRAT spyware being distributed as the messaging apps...
Read More Read more about Android malware GravityRAT steals your WhatsApp backups
Infostealer malware has stolen 101.000 ChatGPT accounts MicrosoftTeams-image-7-6-1024x576
  • BOTNET
  • Backdoor
  • cyberattack
  • Darknet
  • Exploitation
  • infostealer
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Infostealer malware has stolen 101.000 ChatGPT accounts

FHN June 21, 2023
More than 101.000 ChatGPT user accounts have been stolen by infostealer malware over the past year, according...
Read More Read more about Infostealer malware has stolen 101.000 ChatGPT accounts
SeroXen Malware Latest to Deploy BatCloak Evasion Tool malware_shutterstock_161824667-e1464081126105-1280x720
  • Tips
  • BOTNET
  • Compromised
  • Evilproxy
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Security Advisory
  • Security Update

SeroXen Malware Latest to Deploy BatCloak Evasion Tool

FHN June 21, 2023
Security researchers warn that malware developers are adopting a handy obfuscation tool to get malware past antiviruses....
Read More Read more about SeroXen Malware Latest to Deploy BatCloak Evasion Tool
The rise of phishing scams and how to avoid them. DIGI_21_Blog_Password Phishing_BlogPromo_660x371
  • phishing
  • Compromised
  • Email servers
  • Internet Security
  • malicious cyber actors
  • Mobile Security
  • Security Advisory
  • Security Update

The rise of phishing scams and how to avoid them.

FHN June 20, 2023
Cybersecurity scams continue to be on the rise. As scammers get smarter, it’s important to stay up...
Read More Read more about The rise of phishing scams and how to avoid them.
Zyxel patches critical vulnerability in NAS devices (CVE-2023-27992) A25V_1_201906121514262868
  • Tips
  • BOTNET
  • Compromised
  • Evilproxy
  • Internet Security
  • malicious cyber actors
  • Security Advisory
  • Security Update
  • vulnerability

Zyxel patches critical vulnerability in NAS devices (CVE-2023-27992)

FHN June 20, 2023
Zyxel has released firmware patches for a critical vulnerability (CVE-2023-27992) in some of its consumer network attached storage (NAS)...
Read More Read more about Zyxel patches critical vulnerability in NAS devices (CVE-2023-27992)
New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions remote-access-attacks
  • BOTNET
  • Backdoor
  • Compromised
  • cyberattack
  • Data Breach
  • Evilproxy
  • Exploitation
  • infostealer
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions

FHN June 19, 2023
A new stealer malware is on the rise, designed to obtain user credentials to help attackers penetrate...
Read More Read more about New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions
What Is the Principle of Least Privilege (POLP)? cyber-security-freepik-5
  • Tips
  • Evilproxy
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update

What Is the Principle of Least Privilege (POLP)?

FHN June 19, 2023
The principle of least privilege (POLP), also named the “principle of least authority” (POLA) or “the principle...
Read More Read more about What Is the Principle of Least Privilege (POLP)?
New Diicot group targets SSH servers with brute-force malware smartphone malware concept. 3d render.
  • BOTNET
  • Exploitation
  • Internet Security
  • IOC's
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

New Diicot group targets SSH servers with brute-force malware

FHN June 16, 2023
Diicot shares its new name with the Romanian anti-terrorist police unit and uses the same style of...
Read More Read more about New Diicot group targets SSH servers with brute-force malware
Fake zero-day PoC exploits on GitHub spread Windows and Linux malware 03KP3PqDcDZ0Q6DhbLBsuwG-1..v1650383418
  • BOTNET
  • Compromised
  • Internet Security
  • Security Advisory
  • Security Update
  • Zero Day Attack

Fake zero-day PoC exploits on GitHub spread Windows and Linux malware

FHN June 15, 2023
Researchers detected fake company accounts on GitHub linked to a deceitful cybersecurity company. These accounts are promoting harmful...
Read More Read more about Fake zero-day PoC exploits on GitHub spread Windows and Linux malware
Gamaredon: Uses PowerShell USB malware to drop backdoors malware-min-scaled
  • Tips
  • BOTNET
  • Compromised
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Gamaredon: Uses PowerShell USB malware to drop backdoors

FHN June 15, 2023
Russia-linked state-sponsored cyber-espionage group Gamaredon (Armageddon, UAC-0010) continues its relentless attacks against government entities, and organizations in...
Read More Read more about Gamaredon: Uses PowerShell USB malware to drop backdoors
New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs ransomware-image-getty
  • Data Breach
  • Compromised
  • Exploitation
  • Internet Security
  • Malware
  • Security Advisory
  • Security Update
  • windows

New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs

FHN June 14, 2023
A new Golang-based information stealer called Skuld has compromised Windows systems across Europe, Southeast Asia, and the U.S. What...
Read More Read more about New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs
Hackers use BatCloak to make their malware completely undetectable RAT Malware
  • BOTNET
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Hackers use BatCloak to make their malware completely undetectable

FHN June 13, 2023
A fully undetectable (FUD) malware obfuscation engine called BatCloak has been used to deploy various malwastrains since...
Read More Read more about Hackers use BatCloak to make their malware completely undetectable
Fortinet Patches Critical FortiGate SSL VPN Vulnerability desktop-wallpaper-animation-fortinet
  • Exploitation
  • Internet Security
  • Security Advisory
  • Security Update
  • Tips
  • vulnerability

Fortinet Patches Critical FortiGate SSL VPN Vulnerability

FHN June 12, 2023
Fortinet has patched a critical flaw in its Fortigate devices, with admins urged to apply firmware updates...
Read More Read more about Fortinet Patches Critical FortiGate SSL VPN Vulnerability
Google Switches Email Authentication Method Following Exploitation by Scammers brett-jordan-B_j4LJbam5U-unsplash
  • google
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

Google Switches Email Authentication Method Following Exploitation by Scammers

FHN June 12, 2023
Gmail is tightening its implementation of an email security protocol after a researcher discovered a flaw allowing...
Read More Read more about Google Switches Email Authentication Method Following Exploitation by Scammers
Cisco Addresses High-Severity Bug in Secure Client Software hqdefault
  • Tips
  • cisco
  • Compromised
  • Evilproxy
  • Security Advisory
  • Security Update
  • vulnerability

Cisco Addresses High-Severity Bug in Secure Client Software

FHN June 12, 2023
Cisco has recently fixed a high-severity vulnerability found in its Cisco Secure Client (previously known as AnyConnect...
Read More Read more about Cisco Addresses High-Severity Bug in Secure Client Software
New PowerDrop Malware Targets U.S. Aerospace Industry download (1)
  • Malware
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Security Advisory
  • Security Update

New PowerDrop Malware Targets U.S. Aerospace Industry

FHN June 8, 2023
A new PowerShell malware script, named “PowerDrop”, has been discovered to be used in attacks targeting the...
Read More Read more about New PowerDrop Malware Targets U.S. Aerospace Industry
New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency Magnifier searching malware bug. Computer internet error virus concept.
  • malicious cyber actors
  • Internet Security
  • Malicious extension
  • Malware
  • Security Advisory
  • Security Update

New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency

FHN June 8, 2023
A recent malware campaign has been discovered that exploits the Satacom downloader as a means to deploy...
Read More Read more about New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency
Cyclops Ransomware group offers a multiplatform Info Stealer xXaZ3Lb4ZEejUv9ipwK3ha
  • BOTNET
  • Compromised
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Ransomware
  • Security Advisory
  • Security Update

Cyclops Ransomware group offers a multiplatform Info Stealer

FHN June 8, 2023
The Cyclops group has developed multi-platform ransomware that can infect Windows, Linux, and macOS systems. The Cyclops...
Read More Read more about Cyclops Ransomware group offers a multiplatform Info Stealer
Alarming Surge in TrueBot Activity Revealed with New Delivery Vectors Hack alarm shutterstock_1918152971
  • BOTNET
  • Compromised
  • Data Breach
  • Evilproxy
  • Exploitation
  • Internet Security
  • malicious cyber actors
  • Malicious extension
  • Malware
  • Mobile Security
  • Security Advisory
  • Security Update

Alarming Surge in TrueBot Activity Revealed with New Delivery Vectors

FHN June 7, 2023
TrueBot downloader trojan botnet activity has increased significantly in the past month, researchers say. What is TrueBot?...
Read More Read more about Alarming Surge in TrueBot Activity Revealed with New Delivery Vectors
Google fixes new zero-day vulnerability in Chrome browser news-about-google-chrome-zero-day-vulnerability_en
  • BOTNET
  • Compromised
  • Exploitation
  • google
  • Internet Security
  • Mobile Security
  • Security Advisory
  • Security Update
  • Zero Day Attack

Google fixes new zero-day vulnerability in Chrome browser

FHN June 7, 2023
Yesterday, Google addressed another zero-day vulnerability affecting Google Chrome. The Flashpoint Intel Team quickly published an alert to VulnDB customers and...
Read More Read more about Google fixes new zero-day vulnerability in Chrome browser
WordPress: Automatic update to fix vulnerability in Jetpack plugin wordpress
  • Tips
  • Compromised
  • Internet Security
  • Security Advisory
  • Security Update
  • vulnerability
  • wordpress