A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing Zoom’s remote control feature, allowing attackers to take over victims’ computers […]
Author: cyberbytes
ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code
ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising network security and user privacy. […]
Critical PyTorch Vulnerability Allows Hackers to Run Remote Code
A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning framework, allows attackers to execute arbitrary code on systems loading AI […]
Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security
A sophisticated phishing attack exploiting a loophole in Google’s OAuth infrastructure has surfaced, raising significant concerns about the security of Gmail users worldwide. Security researcher […]
Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds
Organizations today face an ever-expanding threat landscape that requires sophisticated detection capabilities to identify and mitigate attacks before they cause damage. By analyzing Web Application […]
How To Conduct End-to-End Forensics From Compromised Endpoint To Network Pivot
The discovery of a compromised endpoint in an organization’s network marks the beginning of what can be a complex forensic investigation. End-to-end forensics involves a […]
Writing Effective Detection Rules With Sigma, YARA, And Suricata
In the ever-evolving world of cybersecurity, the ability to detect threats quickly and accurately is crucial for defending modern digital environments. Detection rules are the […]
APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures
The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that’s targeting diplomatic entities across Europe with a new […]
Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram bot library but harbor SSH backdoors and data […]
Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access
In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus, has exploited a critical vulnerability in Ivanti Connect Secure VPN appliances. […]