PoC Exploit Released For Critical Microsoft Word RCE Bug
There has been a proof-of-concept published recently for CVE-2023-21716 that analyzes this vulnerability. This vulnerability has been marked as “Critical” and has been detected...
Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks
Mar 08, 2023Ravie Lakshmanan
A pair of severe security vulnerabilities have been disclosed in the Jenkins open source automation server that could lead to...
Hackers Using Facebook Ads to Attack Critical Infrastructure
A new information stealer has been recently found by cybersecurity researchers at Morphisec which is called “SYS01stealer.” This stealer primarily targets entities from the...
HiatusRAT Malware Attack Routers to Gain Remote Access
Lumen’s Black Lotus Labs recently witnessed that Hackers are currently targeting DrayTek Vigor router models 2960 and 3900 in a campaign known as ‘Hiatus’.
The...
Why Healthcare Can’t Afford to Ignore Digital Identity
Mar 07, 2023The Hacker NewsDigital Identity / Healthcare
Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. —...
SYS01stealer: New Threat Using Facebook Ads to Target Critical Infrastructure Firms
Mar 07, 2023Ravie LakshmananData Safety / Cyber Threat
Cybersecurity researchers have discovered a new information stealer dubbed SYS01stealer targeting critical government infrastructure employees, manufacturing...
Get the Genuine Office 2021 and Windows 11 from $6 for a Limited Time...
Do you want to assemble a new computer and are tired of looking for the lowest-priced components in every online store? And there is...
Transparent Tribe Hackers Distribute CapraRAT via Trojanized Messaging Apps
Mar 07, 2023Ravie LakshmananSpyware / Cyber Espionage
A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an...
Windows Event logs Analysis & Monitoring Guide
Cyber Security operations center is protecting organizations and the sensitive business data of customers. It ensures active monitoring of valuable assets of the business...
Shein’s Android App Caught Transmitting Clipboard Data to Remote Servers
Mar 07, 2023Ravie LakshmananPrivacy / Data Breach
An older version of Shein's Android application suffered from a bug that periodically captured and transmitted clipboard...











