Home Cyber News

Cyber News

Explore the cutting edge of cybersecurity with our Cyber News category. We cover breaking updates on cyber threats, data breaches, ransomware attacks, and the latest tech innovations in security.

Our expert-driven content provides in-depth analyses of incidents, trends, and solutions to help individuals and businesses stay protected in an ever-evolving digital landscape.

From global hacking campaigns to critical vulnerabilities, we ensure you never miss the important stories shaping the world of cybersecurity. Subscribe to our Cyber News Alerts for real-time updates and weekly recaps. Stay informed, secure, and one step ahead of cyber threats.

Okta Warns of Phishing Attacks

Okta Warns of Phishing Attacks Mimic “Okta Support” to Steal MFA Tokens

Okta, a leading identity and access management platform, has issued a warning about an increase in sophisticated phishing attacks targeting its customers by impersonating the company's support team. These attacks are part of a...
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to protect users from web-based attacks such as phishing and malware. This new way to...
Storm-1811 Hackers Exploits RMM Tools to Deliver Black Basta Ransomware

Storm-1811 Hackers Exploits RMM Tools to Deliver Black Basta Ransomware

Storm-1811, a financially driven threat actor that employs social engineering techniques, has recently been observed exploiting RMM tools to distribute the Black Basta ransomware. The threat actor exploits the client management tool, Microsoft Quick Assist,...
Linux Kernel 6.13

Linux Kernel 6.13 Released – Avoiding Holiday Season Clash

In a rare occurrence, the Linux kernel development cycle has aligned favorably with the holiday season this year. Linus Torvalds, the creator and principal developer of the Linux kernel, announced the release of Linux...
CoinLurker, Next-Gen Tool Used by Threat Actors in Modern Cyberattacks

CoinLurker, Next-Gen Tool Used by Threat Actors in Modern Cyberattacks

CoinLurker is a sophisticated data-stealing malware that has revolutionized fake update campaigns. Written in the Go programming language, CoinLurker incorporates advanced obfuscation and anti-analysis techniques, enabling it to evade detection and execute stealthy cyberattacks. According...
Curl Vulnerability Attackers Sensitive Information

Curl Vulnerability Let Attackers Access Sensitive Information

A critical security flaw has been discovered in the popular data transfer tool Curl, potentially allowing attackers to access sensitive information. The vulnerability, identified as CVE-2024-11053, affects curl versions 6.5 through 8.11.0 and could lead...
Vulnerabilities in Skoda & Volkswagen Cars Let Hackers Remotely Track Users

Vulnerabilities in Skoda & Volkswagen Cars Let Hackers Remotely Track Users

Cybersecurity researchers have discovered several vulnerabilities in the infotainment systems of certain Skoda and Volkswagen car models. These vulnerabilities may allow hackers to track and access sensitive user data remotely. PCAutomotive, a specialized automotive cybersecurity...
Let’s Encrypt OCSP End Support

Let’s Encrypt to End Support for Online Certificate Status Protocol (OCSP)

Let’s Encrypt, a leading provider of free SSL/TLS certificates, has officially announced its timeline for discontinuing support for the Online Certificate Status Protocol (OCSP) in favor of Certificate Revocation Lists (CRLs). This decision, driven by...
Chrome Security Update, Patch for 3 High-severity Vulnerabilities

Chrome Security Update, Patch for 3 High-severity Vulnerabilities

Google has released a critical security update for its Chrome browser, addressing three high-severity vulnerabilities that could potentially expose users to significant risks. The latest update, version 131.0.6778.139/.140 for Windows and Mac and 131.0.6778.139 for...
D-Link Routers Under Attack

D-Link Routers Under Attack – Botnet Exploiting Devices to Gain Full Remote Control

A surge in cyberattacks leveraging legacy vulnerabilities in D-Link routers has been detected, with two botnets, FICORA and CAPSAICIN, actively exploiting these weaknesses. Researchers at Fortinet’s FortiGuard Labs observed a spike in activity from...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...