Month: September 2024
-
SonicWall Warns of Access Control Vulnerability Exploited in the Wild
SonicWall has issued an urgent security advisory regarding a critical vulnerability (CVE-2024-40766) affecting its [firewall](https://cybersecuritynews.com/best-linux-firewalls/) products. The company warns that…
-
Linux Pluggable Authentication Modules Abused to Create Backdoors
The Group-IB Digital Forensics and Incident Response (DFIR) team has uncovered a novel technique that exploits Linux’s Pluggable Authentication Modules…
-
Critical Progress LoadMaster Vulnerability Let Attackers Execute Arbitrary Code
A critical vulnerability has been identified in the LoadMaster product line, including all LoadMaster releases and the LoadMaster Multi-Tenant (MT)…
-
Researcher Details Exploitation of Exchange PowerShell via MultiValuedProperty
OffensiveCon 2024 devised multiple methods to exploit Microsoft Exchange. One method was using the MultiValuedProperty, through which a researcher was…
-
6 Hackers Charged for Hacking Ukrainian Government Networks
A grand jury in Maryland has charged six Russian nationals with conspiracy to engage in computer intrusion and wire fraud.The…
-
PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access
Google Released a Proof-of-Concept (PoC) for a critical security vulnerability, identified as CVE-2024-26581, which has been discovered in the Linux…
-
Electric vehicle (EV) Owners beware of Quishing Attacks via EV Chargers
Electric vehicle (EV) owners, beware: quishing attack targeting charging stations is on the rise. This cyber threat combines QR codes…
-
How Modern Malware Exploits Discord and Telegram for Malicious Activities
Although Discord and Telegram are some of the most popular communication channels today, they aren’t just used for chatting and…
-
RAMBO Attack Steals Data From Air-gapped Systems
Researchers explore the [vulnerability](https://cybersecuritynews.com/vulnerability-management-tools/) of air-gapped networks to malicious attacks. Despite their physical isolation, these networks can be compromised through…
-
Locked In, Locked Out: How Data Breaches Shatter Refugees’ Safety
What can be done to protect refugees’ privacy rights and enhance their digital security?In an article published by the [Tahrir…