Rapidly Information Technology News
Last week, numerous Linux users encountered a serious issue: their devices failed to boot after an update released by Microsoft as part of Patch Tuesday. Instead of the system starting normally, an error message...
A critical vulnerability has been discovered in the popular WordPress plugin, GiveWP, which is widely used for collecting donations and conducting fundraising campaigns. This flaw endangers the security of over 100,000 websites, exposing them...
Researchers at Tenable have discovered a critical vulnerability in the Microsoft Copilot Studio platform, which allows an attacker to gain access to confidential information through an SSRF attack. The flaw could affect Microsoft’s internal...
Researchers at Kaspersky Lab have reported new activity by the cyber group BlindEagle, which has been conducting cyber espionage campaigns targeting organizations and individuals in Latin America since 2018. In June 2024, the group...
Proofpoint reports that Iranian hackers launched a phishing attack on a prominent Jewish religious leader using several spoofed email addresses. A direct connection between the attack and members of the IRGC could not be...
The new malicious software, UULoader, is being actively utilized by hackers to deliver dangerous programs such as Gh0st RAT and Mimikatz. Discovered by researchers at Cyberint, this malware spreads through fake installation files of...
In recent months, cybersecurity experts have identified the active use of a new tool for attacks on cloud services, known as Xeon Sender. This tool is being exploited by malicious actors to conduct phishing...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Jenkins vulnerability to its Known Exploited Vulnerabilities (KEV) catalog after it was leveraged in ransomware attacks. The vulnerability, identified as CVE-2024-23897 with...
The Cisco Talos team has identified eight vulnerabilities in Microsoft applications for macOS that allow unauthorized access to permissions and privileges granted to specific applications. These flaws enable attackers to inject malicious libraries into...
New details have emerged regarding the National Public Data (NPD) data breach. A company affiliated with NPD, which had access to the same databases, accidentally published passwords to these databases directly on its website....
Researchers at Check Point Research (CPR) have uncovered a new malware called Styx Stealer, which is capable of exfiltrating browser data, sessions from Telegram and Discord messengers, as well as cryptocurrency. Despite its recent...
Cybersecurity researchers have uncovered a new digital infrastructure linked to the financially motivated cybercriminal group known as FIN7. This discovery emerged from a collaborative investigation conducted by Team Cymru, Silent Push, and Stark Industries...