Source: www.infosecurity-magazine.com – Author: 1 A suspected scammer who used scareware to trick hundreds of thousands of global victims into handing over money has been arrested...
Day: July 19, 2023
WooCommerce Bug Exploited in Targeted WordPress Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have recorded over one million attempts to compromise a popular WordPress plugin over the past few days. Wordfence said...
IT Security Pro Jailed for Attempted Extortion – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A former IT security analyst has been jailed for three years and seven months after attempting to extort his employer, according...
BreachForums Admin Pleads Guilty to Hacking Charges – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Conor Brian Fitzpatrick, famously known as “Pompompurin,” has entered a guilty plea for hacking charges in the United States District Court...
Ukraine’s CERT-UA Exposes Gamaredon’s Rapid Data Theft Methods – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The Ukrainian government’s Computer Emergency Response Team (CERT-UA) has recently unveiled the rapid data theft methods of the APT known as...
Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Attackers have been observed using the notorious Sorillus remote access trojan (RAT) and phishing attacks to exploit Google Firebase Hosting infrastructure. The...
Virustotal data leak exposed data of some registered customers, including intelligence members – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The online malware scanning service VirusTotal leaked data associated with some registered customers, German newspapers reported. German newspapers Der Spiegel and Der...
FIN8 Group spotted delivering the BlackCat Ransomware – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The cybercrime group FIN8 is using a revamped version of the Sardonic backdoor to deliver the BlackCat ransomware. The financially motivated group...
Hacking campaign targets sites using WordPress WooCommerce Payments Plugin – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Threat actors are actively exploiting a critical flaw, tracked as CVE-2023-28121, in the WooCommerce Payments WordPress plugin. Threat actors are actively...
JumpCloud revealed it was hit by a sophisticated attack by a nation-state actor – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Software firm JumpCloud announced it was the victim of a sophisticated cyber attack carried out by a nation-state actor. JumpCloud...
Adobe warns customers of a critical ColdFusion RCE exploited in attacks – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Adobe is warning customers of a critical ColdFusion pre-authentication RCE bug, tracked as CVE-2023-29300, which is actively exploited. Adobe warns...
Admins of Genesis Market marketplace sold their infrastructure on a hacker forum – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The admins of the darkweb Genesis Market announced the sale of their platform to a threat actor that will restart...
Cisco fixed a critical flaw in SD-WAN vManage – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Cisco warns of a critical unauthenticated REST API access vulnerability, tracked as CVE-2023-20214, impacting its SD-WAN vManage. Cisco addressed a...
Pompompurin, the BreachForums owner, pleads guilty to hacking charges and possession of child pornography – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The owner of the BreachForums Conor Brian Fitzpatrick, aka Pompompurin, pleads guilty to hacking charges. The owner of the BreachForums...
WormGPT, the generative AI tool to launch sophisticated BEC attacks – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The WormGPT case: How Generative artificial intelligence (AI) can improve the capabilities of cybercriminals and allows them to launch sophisticated...
Security Affairs newsletter Round 428 by Pierluigi Paganini – International edition – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Privacy Overview This website uses cookies to improve your experience while you navigate through the website. Out of these cookies,...
Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Editor Here’s how cybercriminals have adjusted their tactics in response to Microsoft’s stricter security policies and other interesting findings from ESET’s new...
The danger within: 5 steps you can take to combat insider threats – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Márk Szabó Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your...
ESET Research Podcast: Finding the mythical BlackLotus bootkit – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: ESET Research A story of how an analysis of a supposed game cheat turned into the discovery of a powerful UEFI threat...
CISA to Gov’t Agencies: Mitigate a Flaw in Windows and Office – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The U.S. government is giving federal agencies three weeks to mitigate a zero-day security flaw affecting Microsoft’s Windows and Office...
BSides Sofia 2023 – Radoslav Gerganov – Hyundai Head Unit Hacking – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News Features Industry Spotlight News...
Randall Munroe’s XKCD ‘Geohydrotypography’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News Features Industry Spotlight News...
How to Break the ROI of SMS Toll Fraud – Source: securityboulevard.com
Source: securityboulevard.com – Author: Frank Teruel SMS fraud comes in many forms, all driven by the ubiquity of SMS, the low risk to the attacker, and...
Stop Focusing on Just Phishing – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Williams Does A Focus on Phishing Make Sense? Most high-profile breaches that I’ve seen in the news tend to focus on...
The Ultimate Guide to Learning Burp Suite for FREE – Source: securityboulevard.com
Source: securityboulevard.com – Author: Dana Epp Introduction When it comes to the tools of the trade for web app and API security testing, Burp Suite should...
The Future of MSPs: Automated Ticket Resolution – Source: securityboulevard.com
Source: securityboulevard.com – Author: newscred By Daniel Garcia, CCO of PiaGuest Author In today’s current technological climate, managed services providers (MSPs) are in demand more than...
Biden Admin Eyes IoT Cybersecurity With Device Labeling Program – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The White House is teaming up with top tech players like Amazon, Google and Samsung to tackle the thorny issue...
BSides Sofia 2023 – Vangelis Stykas And Felipe Solferin – Stalking The Stalkers – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News Features Industry Spotlight News...
What is Your Security Attack Surface? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka As businesses and individuals become more reliant on technology, they inadvertently increase their security attack surface – the sum total...
Utility Experts Highlight Chinese Threat to US Electric Grid – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Governance & Risk Management , Operational Technology (OT) Compromised Equipment, AI Leave US Electric Grid Susceptible to Chinese Attacks Michael Novinson...