
Hackers Employ JavaScript Framework To Trick Users Copy, Paste And Command Execution
Hackers use JavaScript frameworks since they offer a wide range of functionalities and tools that could be used to bypass detection, hide code, and carry out harmful acts. In addition, they take advantage of the people’s trust in such popular

Hackers Actively Exploiting Checkpoint 0-Day Flaw
Cybersecurity experts have identified a critical zero-day vulnerability in Checkpoint’s security software that hackers are actively exploiting. The flaw assigned to the identifier CVE-2024-24919 poses a significant threat to organizations relying on Checkpoint’s solutions for their cybersecurity needs. Details of

Microsoft Observed Huge-Surge In Attacks Targeting Internet-Exposed OT Devices In WWS
Microsoft has reported a significant increase in cyberattacks targeting internet-exposed, poorly secured operational technology (OT) devices. These attacks have particularly focused on the United States’ water and wastewater systems (WWS). Various nation-backed actors, including the IRGC-affiliated “CyberAv3ngers” and pro-Russian hacktivists,

Indian Stock Exchange BSE Starts Encrypting Messages to Traders
The Bombay Stock Exchange (BSE) has begun encrypting messages sent to traders, becoming the first exchange in the world to implement such a system. The move aims to enhance security and protect sensitive information in the face of growing cyber

Russian Hackers Charged For Selling Unauthorized Access To Computer Networks
A Russian citizen has been indicted for working as an “access broker” and selling unauthorized access to computer networks, including a victim company in New Jersey, U.S. Attorney Philip R. Sellinger, District of New Jersey, announced. Details of the Indictment Evgeniy Doroshenko,

Notorious Data Leak Site Breachforums is back From the Seizure
The notorious data breach forum, Breachforums, has re-emerged after being confiscated by authorities in a surprising development. According to the recent tweet from Dark Web Informer, the news has sent shockwaves through the cybersecurity community and raised concerns about the

Hackers Advertising Pulse Connect Secure VPN RCE 0-Day
Cybersecurity experts have identified a critical zero-day vulnerability in Pulse Connect Secure VPN, a widely used virtual private network solution. The vulnerability, which allows for remote code execution (RCE), has been actively exploited by hackers, raising significant concerns among organizations relying on

Ransomware Attacks Targeting VMware ESXi Infrastructure Adopt New Pattern
Cybersecurity professionals at Sygnia have noted a notable change in the strategies used by ransomware groups that are aiming at virtualized environments, specifically VMware ESXi infrastructure, in relation to development. The incident response team has noted a steady increase in

Threat Actor Claiming Access to AWS, Azure, MongoDB & Github API Keys
A threat actor has claimed to have gained unauthorized access to API keys for major cloud service providers, including Amazon Web Services (AWS), Microsoft Azure, MongoDB, and GitHub. The announcement was made via a post on the social media platform X by

Rockwell Automation Warns Admin to Disconnect Devices From Internet
Rockwell Automation has sent an urgent message to all of its customers because of rising geopolitical issues and hostile cyber activity worldwide. The company is asking that any devices currently connected to the public internet be checked out immediately and shut