AnuPriya

1747 POSTS
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Exclusive articles:

Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domains

Active Directory sites have long been overlooked as potential attack vectors, relegated to the realm of network infrastructure management rather than security concerns. However,...

Researchers Use Call Gadgets to Evade Elastic EDR Call-Stack Signatures

Security researchers have uncovered a sophisticated technique that exploits call gadgets to bypass Elastic EDR's signature-based detection mechanisms. The method works by inserting arbitrary modules...

LeakyInjector and LeakyStealer Malware Campaign Steals Cryptocurrencies and Browser Data

A sophisticated threat campaign has emerged, marked by the pairing of LeakyInjector and LeakyStealer, two newly discovered malware strains targeting users to siphon cryptocurrency...

Amazon WorkSpaces for Linux Vulnerability Allows Extraction of Valid Auth Tokens

A critical security vulnerability in the Amazon WorkSpaces client for Linux has emerged as a significant threat to organizations utilizing AWS virtual desktop infrastructure....

OPNsense Firewall Update Fixes Critical Security Flaws and Enhances Stability

OPNsense has released a new update addressing critical security vulnerabilities and enhancing firewall functionality. The latest version ships with multiple third-party security updates and...

Breaking

Herodotus Android Malware Gains Total Device Access, Bypassing Antivirus Defenses

A newly discovered Android banking Trojan, Herodotus, is circulating...

Security Report Details LockBit 5.0’s Advanced Tools and Dual-Step Execution Strategy

Flashpoint's latest technical analysis confirms that LockBit 5.0, which...

Google Maps Introduces Feature to Report Ransom Demands Linked to Fake Reviews

Bad actors are increasingly turning to review-bombing tactics as...

Threat Actors Exploit Exposed RDP Credentials to Distribute Cephalus Ransomware

Cephalus represents an emerging threat in the cybersecurity landscape,...
spot_imgspot_img