Hackers Launching large-Scale phishing-as-a-service Operation with 300,000 newly created Phishing Domains – Microsoft

Large-scale well-organized phishing as a service (PhaaS) operation is uncovered recently by Microsoft. This platform helps users to customize campaigns and develop their own phishing ploys. The PhaaS platform can be used for phishing kits, email templates, and hosting services. The operation was marketed by the threat actors as Bulletprooflink when they found a high […]

Continue Reading

Critical RCE Flaw in the core Netgear Firmware Let Remote Attackers to Take Control of an Affected System

The cybersecurity organization GRIMM has recently announced vulnerability research towards a series of Netgear SOHO devices. The vulnerability that has been discovered generally enables remote code execution (RCE) as root and lets attackers take control of an affected system.  This vulnerability isn’t a typical router vulnerability, in this kind of vulnerability the actual source is […]

Continue Reading

Microsoft Warns of Azure Bug That Let Attackers take Control of Azure Container Instances (ACI)

The security analysts of the Palo Alto Networks have recently pronounced about a new vulnerability that has been named Azurescape. According to the report, the issue involved the Azure Container Instances, a cloud service that enables companies to deploy packaged applications (containers) in the cloud. However, the security experts asserted that this issue allotted a […]

Continue Reading

Ukrainian man Extradited For Selling Thousands Of Computers Login on a Dark Web Website

In the United States, Florida Karin Hoppmann has announced the extradition of Glib Oleksandr Ivanov-Tolpintsev. They are in a conspiracy where they traffic unauthorized access devices and computer passwords. He has been imprisoned, and he faces the maximum penalty of 17 years of imprisonment. This incident always notifies Ivanov Tolpintsev that they are alleged around […]

Continue Reading

F5 BIG-IP Flaw Let Hackers Execute Arbitrary System Commands

F5 Networks have addressed critical vulnerabilities in its BIG-IP networking device. The vulnerability tracked as CVE-2021-23031 is a privilege escalation issue on BIG-IP Advanced Web Application Firewall (WAF) and Application Security Manager (ASM) Traffic Management User Interface (TMUI). BIG-IP Flaw According to the security advisory, when this vulnerability is exploited, an authenticated attacker with access […]

Continue Reading