Cyber Security News

Our category for the newest news in cybersecurity includes new threats, data breaches, and security tools. For the protection of digital assets, we keep you up to date on hacking strategies, rules, and best practices. Knowing how cybersecurity is changing can help you keep your data and processes safer.

Researchers Detailed Credential Abuse CycleResearchers Detailed Credential Abuse Cycle

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them to gain unauthorized access. This…

3 hours ago
New Android Malware SpyAgent Taking Screenshots Of User’s DevicesNew Android Malware SpyAgent Taking Screenshots Of User’s Devices

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices. …

3 hours ago
Tor Network Suffers IP Spoofing Attack Via Non-Exit RelaysTor Network Suffers IP Spoofing Attack Via Non-Exit Relays

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse complaints and temporary disruptions. While…

4 hours ago
Metasploit Framework Released with New FeaturesMetasploit Framework Released with New Features

Metasploit Framework Released with New Features

The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced an exciting new release packed…

6 hours ago
Threat Actors Allegedly Claim Leak of 489 Million Lines of Instagram DataThreat Actors Allegedly Claim Leak of 489 Million Lines of Instagram Data

Threat Actors Allegedly Claim Leak of 489 Million Lines of Instagram Data

A threat actor has allegedly scraped 489 million lines of Instagram user data, including sensitive information, which is now reportedly…

7 hours ago
Threat Actors Allegedly Claim Leak of Harley-Davidson DatabaseThreat Actors Allegedly Claim Leak of Harley-Davidson Database

Threat Actors Allegedly Claim Leak of Harley-Davidson Database

Threat actors known as "888" have allegedly leaked the database of Appleton Harley-Davidson, a prominent dealership affiliated with the iconic…

8 hours ago
CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in AttacksCISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks

CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns organizations of a critical vulnerability in Palo Alto Networks' Expedition tool,…

3 days ago
Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive InformationCisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information

Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information

A significant vulnerability (CVE-2024-20445) has been discovered in Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and…

4 days ago
Cisco Flaw Let Attackers Run Command as Root UserCisco Flaw Let Attackers Run Command as Root User

Cisco Flaw Let Attackers Run Command as Root User

A critical vulnerability has been discovered in Cisco Unified Industrial Wireless Software, which affects Cisco Ultra-Reliable Wireless Backhaul (URWB) Access…

4 days ago
Researchers Detailed Credential Abuse CycleResearchers Detailed Credential Abuse Cycle

Researchers Detailed Credential Abuse Cycle

The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a hacking group responsible for distributed denial-of-service…

5 days ago