Firewall daily
Read the latest cybersecurity news, briefs, and in-depth analysis.
-
Alleged Luxor Data Breach Exposes Sensitive SQL Database
The alleged leaked data, initially shared on the Telegram channel Leakbase, comprises 692 MB of SQL data, encompassing a trove…
-
Fortify Your Systems With An Effective API Security Strategy
API security is not a one-time fix but a continuous process of improvement and adaptation. by thecyberexpress January 21st, 2024…
-
Internet Traffic Hacking: TAs Exploiting Trusted Platforms
Internet traffic hacking relies on legitimate internet services (LIS): 25% leverage LIS in their operations, with 68.5% utilizing multiple LIS…
-
Maxicare Data Breach: Probe Launched, Impact Limited
Maxicare assures its members that no sensitive medical information has been exposed. by Samiksha Jain June 19th, 2024 Share on…
-
Are You Following Safe Browsing Patterns?
Cybercriminals are using bogus ads at the top of your search results to lure you. A visit is enough to…
-
Passenger Finds Exploitable Bug In Airline Wi-Fi Service 2022
After creating a test account and browsing some pages online while being onboard, the individual noticed a request that contained…
-
Anime/Manga: Fueling Threat Actors’ Cyber Attacks?
What has cybercriminal gangs got to do with Anime/Manga characters? They share common names!! by thecyberexpress Last updated on June…
-
Google Search Ranking Explosive Leak Of Internal Documents
A leak of Google documents offers a glimpse into the factors influencing search results. The leak's impact is likely to…
-
Fortinet FortiSIEM Vulnerability Raises RCE Risks
Successful exploitation of these FortiSIEM vulnerabilities could enable remote attackers to execute code using the affected service account. by Ashish…
-
Patch Your Check Point Gateways Now To Avoid Hackers
Australian organizations are urged to patch their Check Point security gateways immediately due to a critical vulnerability (CVE-2024-24919). by Krishna…
-
Social Engineering In The Age Of AI
There’s no silver bullet against social engineering attacks. But vigilance and awareness are going to beat overconfidence in technological solutions.…
-
TCE Cyberwatch: Your Weekly Guide To Staying Secure Online
Keep reading to ensure your safety and stay up to date with the cyber world. by Alan J May 13th,…
-
Cyber Toufan Claims Cyberattacks On Israel Cybersecurity
These cyberattacks on Israel's cybersecurity infrastructure have targeted entities ranging from cybersecurity firms to government archives, raising concerns about the…
-
What Is Malware: Hacker’s Weapon For Cybercrime? 2024
Unsure what is malware or how to protect yourself from it? This article explains everything you need to know: what…
-
Andariel APT Using DoraRAT And Nestdoor Malware To Spy On South Korean Businesses – The Cyber Express
Apart from the backdoors, keyloggers, infostealers, and proxy tools were also used in the attacks. by Mihir Bagwe May 31st,…
-
University Of Hyderabad Data Breach Exposes Students, Admins
The TA claimed to possess a database stolen from the university, allegedly in SQL format, a common database language used…
-
Verified Microsoft India X Account Hacked
The hackers continue to repost their stuff from their account on the Microsoft India X account, which has not yet…
-
Tech In Asia Data Breach: Change Your Password Now!
Leaked data reportedly includes email addresses, names, and other sensitive information by Krishna Murthy June 4th, 2024 Share on LinkedInShare…
-
Atlassian Refutes Cybersecurity Company’s Cyber Attack Claim
Atlassian's security team opened an investigation after cybersecurity company CloudSek issued an alert on unauthorized access to their Cloud account.…
-
The Ransomware Groups That Can Wreak Havoc In 2023
The Cyber Express found five main supervillains in the security domains that pulverized the ambitions of millions and are on…
-
Google Chrome For Desktop Vulnerabilities Fixed, Update Now
Designated as CERT-In Vulnerability Note CIVN-2024-0179, these Chrome Desktop vulnerabilities posed a significant security risk. by Ashish Khaitan June 4th,…
-
Patch CVE-2023-46359: Protect Your EV Charger From Attacks
Additionally, CVE-2023-46359 allows cybercriminals to remotely execute arbitrary commands on the targeted system. by Samiksha Jain June 4th, 2024 Share…
-
Researcher Finds Vulnerability In Kyber Post-Quantum Key Encapsulation Mechanism (KEM)
The Kyber post-quantum key encapsulation vulnerability shows that code that appears secure can be undone by a compiler. by Paul…
-
TikTok Zero-Day Vulnerability Exploited By Hackers
The TikTok zero-day vulnerability has impacted and hijacked accounts belonging to CNN, Sony, and Paris Hilton. by Samiksha Jain June…
-
Dark Web Hacker Advertises XSS-DOM Risks In Google Subdomains
Tombstone's Exploit post lacked pricing, urging private inquiries. The vulnerabilities endanger Google, demanding swift action. by Ashish Khaitan June 12th,…
-
Monti Ransomware Sold! New Owners Hint Future Plans
The change in ownership and a shift in focus towards Western countries highlights a new approach towards ransomware. by Ashish…
-
Hacker Advertises New Click Fraud Software For Google ADS
The threat actor claims that the new click fraud software offers innovative features, capable of depleting competitors' budgets. by Ashish…
-
IT Army Of Ukraine Claims The SPIEF 2024 Cyberattack
The SPIEF 2024 cyberattack employed DDoS assaults, peaking at 200,000 malicious requests per second. by Ashish Khaitan June 13th, 2024…
-
What Is Internet? History, Working, Uses, Advantages
Analyze the comprehensive guide What is Internet, covering its historical evolution, operational mechanisms, diverse applications, and the associated benefits and…
-
Decoding D-Link NAS Vulnerabilities: Risks And Mitigation
A user named "netsecfish" disclosed these D-Link vulnerabilities and it targets the nas_sharing.cgi CGI script. by Ashish Khaitan April 12th,…