Cyber Accord
  • Home
  • Services
    • Security Testing
    • CLOUD SECURITY
    • GAP ASSESSMENTS
    • Compliance Readiness
    • Advisory
    • Questionnaires
  • About us
  • Contact
  • Our Blogs
Select Page
“New xRAT Malware Targeting Windows Users Poses as Adult Gaming Application”

“New xRAT Malware Targeting Windows Users Poses as Adult Gaming Application”

Cyber Security

“`html A perilous malware risk has emerged targeting Windows users throughout Korea via webhard file-sharing platforms. The Ahnlab Security Intelligence Center has recently uncovered xRAT, also known as QuasarRAT, being disseminated as counterfeit adult games to...
Essential Tools for Combatting Fraud and Chargebacks in E-Commerce

Essential Tools for Combatting Fraud and Chargebacks in E-Commerce

Cyber Security

“`html   A shopper makes a purchase. You dispatch. Everyone appears satisfied. Then, a few weeks later, you receive a chargeback. Or you observe the same card being attempted repeatedly in quick succession, failing initially before succeeding. This could signal...
VMware ESXi Vulnerability: Cybercriminals Leveraging Zero-Day Exploit Toolkit in Active Attacks

VMware ESXi Vulnerability: Cybercriminals Leveraging Zero-Day Exploit Toolkit in Active Attacks

Cyber Security

“`html Cybercriminals are abusing VMware ESXi instances in the wild utilizing a zero-day exploit toolkit that combines several vulnerabilities for VM breaches. The cybersecurity firm Huntress interrupted one such incident, linking the initial breach to an...
“Security Alert: Chrome Extension Compromises Chats of 900,000 Users by Harvesting ChatGPT and DeepSeek Conversations”

“Security Alert: Chrome Extension Compromises Chats of 900,000 Users by Harvesting ChatGPT and DeepSeek Conversations”

Cyber Security

“`html Two malicious Chrome extensions have jeopardized more than 900,000 users by covertly extracting ChatGPT and DeepSeek conversations, along with comprehensive browsing histories, to the attackers’ servers. Uncovered by OX Security analysts, the...
“WhatsApp Security Flaws Expose User Metadata, Revealing Device Operating Systems”

“WhatsApp Security Flaws Expose User Metadata, Revealing Device Operating Systems”

Cyber Security

“`html WhatsApp’s multi-device encryption framework has persistently exposed metadata, permitting adversaries to identify users’ device operating systems, facilitating targeted malware transmission. Recent studies underscore partial corrections by Meta, yet...
“Attackers Captured in Resecurity’s Honeypot Amid Targeted Assault on Employee Network”

“Attackers Captured in Resecurity’s Honeypot Amid Targeted Assault on Employee Network”

Cyber Security

“`html Resecurity implements artificial data honeypots to outwit threat actors, converting reconnaissance into useful intelligence. A recent operation not only ensnared an Egyptian-associated hacker but also misled the ShinyHunters collective into believing...
“Infostealers: How Attackers Exploit Legitimate Business Systems for Malware Hosting”

“Infostealers: How Attackers Exploit Legitimate Business Systems for Malware Hosting”

Cyber Security

“`html An alarming cycle of cybercrime has arisen where pilfered credentials from infostealer malware permit cybercriminals to commandeer authentic business sites and convert them into platforms for distributing malware. Recent findings from the Hudson Rock...
“Over 10,000 Fortinet Firewalls at Risk from Long-Standing MFA Bypass Vulnerability”

“Over 10,000 Fortinet Firewalls at Risk from Long-Standing MFA Bypass Vulnerability”

Cyber Security

“`html More than 10,000 Fortinet firewalls globally remain exposed to CVE-2020-12812, a vulnerability allowing bypass of multi-factor authentication (MFA) identified over five and a half years ago. Recently, Shadowserver incorporated the issue into its daily...
“2025’s Most Exploited High-Risk Vulnerabilities: The Top 10 Threats to Watch Out For”

“2025’s Most Exploited High-Risk Vulnerabilities: The Top 10 Threats to Watch Out For”

Cyber Security

“`html The cybersecurity environment in 2025 has experienced an extraordinary increase in significant vulnerabilities, with more than 21,500 CVEs revealed in merely the first six months of the year, indicating a 16-18% rise when compared to 2024. Among these, a...
“Self-Replicating GlassWorm: Exploiting VS Code Extensions to Target macOS Users”

“Self-Replicating GlassWorm: Exploiting VS Code Extensions to Target macOS Users”

Cyber Security

“`html A fresh onset of GlassWorm malware has surfaced, representing a notable change in targeting approach from Windows to macOS platforms. This self-replicating worm, disseminated via harmful VS Code extensions on the Open VSX marketplace, has already amassed...
« Older Entries
Next Entries »

Recent Posts

  • Microsoft Introduces Latest Update for Windows 11, Versions 25H2 and 24H2
  • “2026’s Leading Data Erasure Services: The Top 10 You Can’t Miss”
  • “Severe Security Flaw in VM2 Sandbox Library for Node.js Allows Unauthorized Code Execution”
  • “Active Exploitation of Microsoft Office Zero-Day Vulnerability: What You Need to Know”
  • Microsoft Probes Boot Failure Challenges in Windows 11 Version 25H2 Post-January Update

Categories

  • Cyber Security
CyberAccord | All Rights Reserved | 2025