Author: latesthackernews.com
As we step into 2024, the digital landscape continues to evolve at an unprecedented pace, bringing with it a host of new challenges and threats. Cybercriminals are becoming increasingly sophisticated, leveraging advanced technologies to exploit…
Uttar Pradesh Launches “Cyber Safe Uttar Pradesh” Campaign to Combat Rising Cybercrime Uttar Pradesh recently took a major step towards strengthening its cybersecurity posture with the inauguration of the Centre of Excellence in Digital Forensics…
Stay informed with the latest global cybercrime news curated by Future crime Researchers. This briefing highlights recent digital fraud incidents and offers insights into effective mitigation strategies. 1. WazirX Exchange Faces Cybersecurity Challenges; Partial INR…
The digital landscape is a battlefield, and this week, a new vulnerability in the Linux kernel has emerged as a major threat. This critical flaw, actively exploited by attackers, has cybersecurity agencies worldwide urging organizations…
Urgent Mitigation Measures Mandated by CISA for Federal Agencies In a significant development, the Cybersecurity and Infrastructure Security Agency (CISA) has issued the first emergency directive of the year, mandating Federal Civilian Executive Branch (FCEB)…
The latest iteration of Kali Linux, version 2023.4, has been unveiled by Offensive Security as the year concludes and the holiday season approaches. Kali Linux, a Debian-derived operating system, is specifically tailored for ethical hacking…
Cybersecurity researchers have recently uncovered a new strain of malware targeting Microsoft Exchange servers, raising concerns among businesses and organizations that rely on these critical infrastructure components. This sophisticated malware, dubbed “KoreLogic,” employs a multi-pronged…
In a concerning development, cybersecurity researchers have recently uncovered modified versions of WhatsApp for Android, equipped with a spyware module named CanesSpy. These modified WhatsApp applications are being distributed through dubious websites advertising these modded…
In a big move against online crooks, India’s Central Bureau of Investigation (CBI) recently took down cybercrime operations. They called it “Operation Chakra-II.” This operation was a joint effort with other countries and tech giants…
A zero-day vulnerability in Cisco’s Adaptive Security Appliance (ASA) firewall has been exploited to implant a malicious Lua backdoor on thousands of devices worldwide. The vulnerability, tracked as CVE-2023-20273, allows for privilege escalation through the…