Akamai Technologies disclosed a critical HTTP request smuggling vulnerability affecting its content delivery network platform that could allow attackers to inject hidden secondary requests through […]
Category: Cyber Security News
‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel
Security researchers have unveiled a sophisticated new attack technique called “Ghost Calls” that exploits popular web conferencing platforms to establish covert command-and-control (C2) channels, effectively […]
HeartCrypt-Packed ‘AVKiller’ Tool Actively Deployed in Ransomware Attacks to Disable EDR
Threat actors are placing a higher priority on neutralizing endpoint detection and response (EDR) systems in order to remain stealthy in the dynamic world of […]
New Active Directory Attack Method Bypasses Authentication to Steal Data
Security researchers have uncovered a novel attack technique that exploits weaknesses in hybrid Active Directory (AD) and Entra ID environments to bypass authentication and exfiltrate […]
Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need
Python is everywhere in modern software. From machine learning models to production microservices, chances are your code—and your business—depends on Python packages you didn’t write. […]
HTTP/1.1 Vulnerability Could Let Attackers Hijack Millions of Sites
Security researchers have unveiled a fundamental vulnerability in HTTP/1.1 that could allow attackers to hijack millions of websites, highlighting a persistent threat that has plagued […]
6 ways hackers hide their tracks
CISOs have an array of ever-growing tools at their disposal to monitor networks and endpoint systems for malicious activity. But cybersecurity leaders face a growing […]
Windows tips for reducing the ransomware threat
As Scattered Spider headlines have reminded us of late, ransomware is always in season. The group has been around for many years, and this year […]
Nvidia Denies Presence of Backdoors, Kill Switches, or Spyware in Its Chips
Nvidia has issued a comprehensive denial regarding allegations that its graphics processing units contain backdoors, kill switches, or spyware, emphasizing that such features would fundamentally […]
SocGholish Uses Parrot and Keitaro TDS to Spread Malware via Fake Updates
SocGholish, operated by the threat actor group TA569, has solidified its role as a prominent Malware-as-a-Service (MaaS) provider, functioning as an Initial Access Broker (IAB) […]