Samsung discloses data breach after July hackElectronics giant Samsung has confirmed a new data breach today after some of its U.S. systems were hacked to steal customer...
Author: admin
Dev backdoors own malware to steal data from other hackers
Dev backdoors own malware to steal data from other hackersCybercriminals using Prynt Stealer to collect data from victims are being swindled by the malware developer, who...
BlackCat ransomware claims attack on Italian energy agency
BlackCat ransomware claims attack on Italian energy agencyThe BlackCat/ALPHV ransomware gang claimed responsibility for an attack that hit the systems of Italy's energy agency Gestore dei Servizi Energetici...
Google Chrome emergency update fixes new zero-day used in attacks
Google Chrome emergency update fixes new zero-day used in attacksGoogle has released Chrome 105.0.5195.102 for Windows, Mac, and Linux users to address a single high-severity security...
Summertime Blues: TA558 Ramps Up Attacks on Hospitality, Travel Sectors
Summertime Blues: TA558 Ramps Up Attacks on Hospitality, Travel SectorsContenido de la entradaLeer másProofpoint News Feed
Malware dev open-sources CodeRAT after being exposed
Malware dev open-sources CodeRAT after being exposedThe source code of a remote access trojan (RAT) dubbed 'CodeRAT' has been leaked on GitHub after malware analysts confronted the...
IRS data leak exposes personal info of 120,000 taxpayers
IRS data leak exposes personal info of 120,000 taxpayersThe Internal Revenue Service has accidentally leaked confidential information for approximately 120,000 taxpayers who filed a form 990-T...
Microsoft Edge 105 won’t start due to old group policy – How to fix
Microsoft Edge 105 won't start due to old group policy - How to fixThe new Microsoft Edge 105 is not starting for many Windows users due...
Fortinet Cloud Security Report
Fortinet Cloud Security ReportOrganizations continue to shift workloads to the cloud at a rapid pace to achieve faster time to market, increased responsiveness, and cost reductions....
SharkBot malware sneaks back on Google Play to steal your logins
SharkBot malware sneaks back on Google Play to steal your loginsA new and upgraded version of the SharkBot malware has returned to Google's Play Store, targeting...
Researchers Spot Snowballing BianLian Ransomware Gang Activity
Researchers Spot Snowballing BianLian Ransomware Gang ActivityThe operators of the emerging cross-platform ransomware BianLian increased their command and control infrastructure this month, indicating an acceleration in...
Traffers threat: The invisible thieves
Traffers threat: The invisible thievesTraffers are cybercriminals organized in teams whose purpose is to steal a maximum of bankable information from infected computers, which they sell...
NIST’s Expanding International Engagement on Cybersecurity
NIST’s Expanding International Engagement on CybersecurityIn providing a foundation for cybersecurity advancements over the years, NIST has taken the global context into account when determining priorities...
Microsoft Defender falsely detects Win32/Hive.ZY in Google Chrome, Electron apps
Microsoft Defender falsely detects Win32/Hive.ZY in Google Chrome, Electron appsA bad Microsoft Defender signature update mistakenly detects Google Chrome, Microsoft Edge, Discord, and other Electron apps...
MSA-22-0022: CSRF risk in enabling/disabling installed H5P libraries
MSA-22-0022: CSRF risk in enabling/disabling installed H5P librariesby Michael Hawkins. Enabling and disabling installed H5P libraries did not include the necessary token to prevent a CSRF...
MSA-22-0021: Upgrade Mustache to latest version (upstream)
MSA-22-0021: Upgrade Mustache to latest version (upstream)by Michael Hawkins. The Mustache template library included with Moodle has been upgraded to the latest version, which includes a...
Log4j vulnerabilities still an issue, but CodeSec audit can help | Contrast Security
Log4j vulnerabilities still an issue, but CodeSec audit can help | Contrast Security Landing on the incident response boards for software engineering teams worldwide in December...
Researchers Detail Emerging Cross-Platform BianLian Ransomware Attacks
Researchers Detail Emerging Cross-Platform BianLian Ransomware AttacksThe operators of the emerging cross-platform BianLian ransomware have increased their command-and-control (C2) infrastructure this month, a development that alludes...
New Evidence Links Raspberry Robin Malware to Dridex and Russian Evil Corp Hackers
New Evidence Links Raspberry Robin Malware to Dridex and Russian Evil Corp HackersResearchers have identified functional similarities between a malicious component used in the Raspberry Robin...
Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content
Google Chrome Bug Lets Sites Silently Overwrite System Clipboard ContentA "major" security issue in the Google Chrome web browser, as well as Chromium-based alternatives, could allow...
Stop Worrying About Passwords Forever
Stop Worrying About Passwords ForeverSo far 2022 confirms that passwords are not dead yet. Neither will they be anytime soon. Even though Microsoft and Apple are...
The Ultimate Security Blind Spot You Don’t Know You Have
The Ultimate Security Blind Spot You Don't Know You HaveHow much time do developers spend actually writing code? According to recent studies, developers spend more time...
Warning: PyPI Feature Executes Code Automatically After Python Package Download
Warning: PyPI Feature Executes Code Automatically After Python Package DownloadIn another finding that could expose developers to increased risk of a supply chain attack, it has...
Apple Releases Update for iOS 12 to Patch Exploited Vulnerability
Apple Releases Update for iOS 12 to Patch Exploited VulnerabilityThe flaw would allow the processing of maliciously crafted web content and arbitrary code executionLeer másThe flaw...
Google Releases Urgent Chrome Update to Patch New Zero-Day Vulnerability
Google Releases Urgent Chrome Update to Patch New Zero-Day VulnerabilityGoogle on Friday shipped emergency fixes to address a security vulnerability in the Chrome web browser that...
BSides Vancouver 2022 – Vivek Ponnada’s ‘OT: Air-Gap Is A Myth And Cloud Is Here To Stay!’
BSides Vancouver 2022 – Vivek Ponnada’s ‘OT: Air-Gap Is A Myth And Cloud Is Here To Stay!’Our sincere thanks to BSides Vancouver for publishing their outstanding...
Prynt Stealer Contains a Backdoor to Steal Victims’ Data Stolen by Other Cybercriminals
Prynt Stealer Contains a Backdoor to Steal Victims' Data Stolen by Other CybercriminalsResearchers discovered a private Telegram channel-based backdoor in the information stealing malware, dubbed Prynt...
JuiceLedger Hackers Behind the Recent Phishing Attacks Against PyPI Users
JuiceLedger Hackers Behind the Recent Phishing Attacks Against PyPI UsersMore details have emerged about the operators behind the first-known phishing campaign specifically aimed at the Python Package Index...
Samsung Admits Data Breach that Exposed Details of Some U.S. Customers
Samsung Admits Data Breach that Exposed Details of Some U.S. CustomersSouth Korean chaebol Samsung on Friday said it experienced a cybersecurity incident that resulted in the...
Log4Shell is the worst security issue of the decade: what you should do
Log4Shell is the worst security issue of the decade: what you should doLast week, we discussed the Log4Shell and other Log4j-related vulnerabilities, implications, and recommended mitigation...























