Balaji

76 POSTS
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Co-Founder & Editor-in-Chief - Cyber Press Inc.,

Exclusive articles:

Critical Vulnerability in .NET & Visual Studio Allow Hackers to Execute Arbitrary Code Remotely

In a significant cybersecurity announcement, Microsoft disclosed a critical vulnerability across its .NET, .NET Framework, and Visual Studio platforms, identified as CVE-2024-21409, which could...

Cybersecurity Alert: Surge in Brute-Force SSH Attacks Targets Linux Servers

In a concerning cybersecurity development, poorly secured Linux SSH servers are increasingly becoming the target of cybercriminals. These attackers deploy sophisticated brute-force and dictionary...

Critical Vulnerabilities in LG TV Let Hackers Gain Root Access

Researchers from biddefender unveiled a series of critical vulnerabilities within LG's WebOS, the operating system powering its smart TVs. The findings, part of Bitdefender's ongoing...

MuddyWater Hacker Group Adds New DarkBeatC2 Tool to Their Arsenal

Iranian cyber actors are working together to launch supply-chain attacks using data from earlier breaches and a new C2 framework that MuddyWater might use.  A...

ScrubCrypt Hacking Tool Delivers 4 Different Malware Via SVG File To Attack Windows

Attackers use phishing emails with SVG attachments to trick users into downloading a ZIP file containing a malicious batch script using BatCloak obfuscation and...

Breaking

Lampion Stealer Uses ClickFix Technique to Steal Login Credentials

Brazilian threat actors behind the Lampion banking trojan have...

Airstalk Malware Targets Windows Systems Using Multithreaded C2 Communication to Steal Credentials

Unit 42 researchers have identified a sophisticated Windows-based malware...

Multiple Jenkins Flaws Include SAML Authentication Bypass and MCP Plugin Permission Issues

Jenkins automation server deployments face significant security risks following...

New Attack Uses Ghost SPNs and Kerberos Reflection to Escalate Privileges on SMB Servers

A sophisticated privilege escalation vulnerability in Windows SMB servers...
spot_imgspot_img