Cyber Accord
  • Home
  • Services
    • Security Testing
    • CLOUD SECURITY
    • GAP ASSESSMENTS
    • Compliance Readiness
    • Advisory
    • Questionnaires
  • About us
  • Contact
  • Our Blogs
Select Page
“Infostealers: How Attackers Exploit Legitimate Business Systems for Malware Hosting”

“Infostealers: How Attackers Exploit Legitimate Business Systems for Malware Hosting”

Cyber Security

“`html An alarming cycle of cybercrime has arisen where pilfered credentials from infostealer malware permit cybercriminals to commandeer authentic business sites and convert them into platforms for distributing malware. Recent findings from the Hudson Rock...
“Over 10,000 Fortinet Firewalls at Risk from Long-Standing MFA Bypass Vulnerability”

“Over 10,000 Fortinet Firewalls at Risk from Long-Standing MFA Bypass Vulnerability”

Cyber Security

“`html More than 10,000 Fortinet firewalls globally remain exposed to CVE-2020-12812, a vulnerability allowing bypass of multi-factor authentication (MFA) identified over five and a half years ago. Recently, Shadowserver incorporated the issue into its daily...
“2025’s Most Exploited High-Risk Vulnerabilities: The Top 10 Threats to Watch Out For”

“2025’s Most Exploited High-Risk Vulnerabilities: The Top 10 Threats to Watch Out For”

Cyber Security

“`html The cybersecurity environment in 2025 has experienced an extraordinary increase in significant vulnerabilities, with more than 21,500 CVEs revealed in merely the first six months of the year, indicating a 16-18% rise when compared to 2024. Among these, a...
“Self-Replicating GlassWorm: Exploiting VS Code Extensions to Target macOS Users”

“Self-Replicating GlassWorm: Exploiting VS Code Extensions to Target macOS Users”

Cyber Security

“`html A fresh onset of GlassWorm malware has surfaced, representing a notable change in targeting approach from Windows to macOS platforms. This self-replicating worm, disseminated via harmful VS Code extensions on the Open VSX marketplace, has already amassed...
“Major Magecart Attack: Over 50 Malicious Scripts Targeting Checkout and Account Creation Processes”

“Major Magecart Attack: Over 50 Malicious Scripts Targeting Checkout and Account Creation Processes”

Cyber Security

“`html A vast-scale web skimming scheme has surfaced throughout the internet, targeting online consumers and account holders with unparalleled reach. Security analysts have detected an extensive global initiative with over 50 scripts that seize sensitive data...
“Silver Fox Cybercriminals Target Indian Organizations with Income Tax Phishing Scams”

“Silver Fox Cybercriminals Target Indian Organizations with Income Tax Phishing Scams”

Cyber Security

“`html Chinese cyber adversaries known as Silver Fox are targeting Indian institutions via advanced phishing operations that mimic genuine income tax documents. This attack campaign leverages authentic-looking emails from the Income Tax Department to deceive...
« Older Entries
Next Entries »

Recent Posts

  • “Advanced AI-Driven Penetration Testing Tool Featuring Integrated HexStrike and Predefined Attack Playbooks”
  • CISA Issues Alert on Exploited SQL Injection Vulnerability in Microsoft Configuration Manager
  • CISA Alerts on Exploited Code Execution Vulnerability in Notepad++
  • “Russia Cuts Off WhatsApp Access for Over 100 Million Users Across the Country”
  • “Emerging Threat: Windows Remote Desktop Services 0-Day Exploit for Privilege Escalation Discovered”

Categories

  • Cyber Security
CyberAccord | All Rights Reserved | 2025