General Security News
-
Google CTF 2023 – Rewards over $32,000 For Winners
CTF (Capture The Flag) exercises have existed for several years. These CTF exercises provide a great challenge and provide great knowledge for...
-
Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
Enterprise security firm Barracuda on Tuesday disclosed that a recently patched zero-day flaw in its Email Security Gateway (ESG) appliances had...
-
Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers
Multiple security flaws uncovered in Sonos One wireless speakers could be potentially exploited to achieve information disclosure and remote code...
-
CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security
Cybersecurity researchers are warning about CAPTCHA-breaking services that are being offered for sale to bypass systems designed to distinguish...
-
New Phishing Attack Abuses .Zip Domain to Emulate Fake WinRAR Within the Browser
A phishing attack that involved mimicking a browser-based file archiver software like WinRAR using a .zip domain to enhance its credibility. The...
-
Invicta Malware Delivered Through Fake GoDaddy Refund Invoices
The creator of this Invicta malware is heavily active on social networking sites, using them to advertise their information-stealing malware and...
-
New Bandit Malware Attacks Browsers to Steal Personal & Financial Logins
Bandit malware prioritizes Windows as its target and leverages the legitimate command-line tool to execute programs under different user...
-
Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users
A new open source remote access trojan (RAT) called DogeRAT targets Android users primarily located in India as part of a sophisticated malware...
-
New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones to bypass user...
-
AceCryptor: Cybercriminals' Powerful Weapon, Detected in 240K+ Attacks
A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016. Slovak...
-
Critical Google Cloud’s SQL Service Flaw Exposes Sensitive Data
Critical Google Cloud SQL Service could be exploited by attackers to access sensitive data and breach other cloud services. The post Critical...
-
What is SaaS Security? – Types, Challenges, Threats & Protection Guide
SaaS (Software-as-a-Service) has become popular for delivering software applications and services over the cloud. While SaaS offers numerous...