EHA
Rank Math SEO Plugin Flaw Exposes 2M+ Websites to Cyber Attack

Rank Math SEO Plugin Flaw Exposes 2M+ Websites to Cyber Attack

A significant vulnerability has been identified in the Rank Math SEO plugin for WordPress. This flaw, cataloged under CVE-2023-32600, exposes over two million websites to potential cyber-attacks, posing a severe security risk to online...
Embedded Links in PDF Attachments

TA450 Hackers Uses Embedded Links in PDF Attachments to Attack Windows

In a concerning development in cyber warfare, the Iran-aligned threat actor known as TA450, also recognized by aliases such as MuddyWater, Mango Sandstorm, and Static Kitten, has been reported to employ a new strategy...
U.S. and UK Impose Sanctions Chinese Hackers

U.S. and UK Impose Sanctions on APT 31 Chinese Hackers for Cyber Attacks

In a significant move to counter cyber threats, the United States and the United Kingdom have imposed sanctions on a group of China-linked hackers accused of targeting critical infrastructure in the U.S. The coordinated...
XSS Vulnerability in Google Subdomain

XSS Vulnerability in Google Subdomain Let Hackers Hijacks the User Sessions

Security researcher Henry N. Caga has identified a significant cross-site scripting (XSS) vulnerability within a Google sub-domain that allows hackers to perform various attacks, including session hijacking, phishing attacks, malware distribution, and data Theft. This...

5 Steps to Effective Junior SOC Specialist Training in 2024

The Security Operations Center (SOC) is critical to any organization's cybersecurity strategy. Every SOC’s success hinges on the competence of its team members. This article provides a five-step training blueprint to develop competent junior...
167,500 Instances Found Vulnerable to Loop DoS Attack

167,500 Instances Found Vulnerable to Loop DoS Attack

A sweeping vulnerability has been uncovered, leaving an estimated 167,500 instances across various networks susceptible to a Loop Denial of Service (DoS) attack. This discovery underscores the ever-present and evolving threats in the digital...
Ivanti RCE flaw Let Attackers Execute Arbitrary Commands

Ivanti RCE flaw Let Attackers Execute Arbitrary Commands

Ivanti has been discovered with a new vulnerability on Ivanti Standalone Sentry that is associated with Remote code execution. The CVE for this vulnerability has been assigned with CVE-2023-41724, and the severity was given...
Taxpayers Beware: Hackers Unleash Clever Tactics in Latest Cyber Attacks

Taxpayers Beware: Hackers Unleash Clever Tactics in Latest Cyber Attacks

As tax season rolls around, a period marked by the rush to meet filing deadlines and ensure compliance with tax laws, cybercriminals are ramping up their efforts to exploit this busy time. Leveraging sophisticated...
New Application-Layer Loop DoS Attack: Impacts 300,000 Online Systems

New Application-Layer Loop DoS Attack: Impacts 300,000 Online Systems

Cybersecurity researchers have identified a new form of denial-of-service (DoS) attack that could disrupt over 300,000 internet-connected systems worldwide. This novel attack, which targets the application layer of network communication, has raised significant concerns...
Operation PhantomBlu: Attackers Utilising Weaponized MS Office Doc to Hack Windows

Operation PhantomBlu: Attackers Utilising Weaponized MS Office Doc to Hack Windows

Researchers from Perception Point identified a new malware campaign, PhantomBlu, targeting US organizations that use novel techniques to deploy NetSupport RAT, a remote access trojan, by exploiting legitimate features of Microsoft Office document templates...

Managed WAF

Website

Latest News