Source: thehackernews.com – Author: . A new stealthy information stealer malware called Bandit Stealer has caught the attention of cybersecurity researchers for its ability to target...
Category: Cyber Info Providers Partners
Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking – Source:thehackernews.com
Source: thehackernews.com – Author: . May 27, 2023Ravie LakshmananAPI Security / Vulnerability A critical security vulnerability has been disclosed in the Open Authorization (OAuth) implementation of...
Careless IT security worker exploited ransomware attack against his employer, but failed to cover his tracks – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley Bad enough for your company to be held to ransom after a cyber attack. Worse still to then have one...
Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A recently identified ransomware operation called Buhti is using LockBit and Babuk variants to target both Linux and Windows systems,...
Google Cloud Users Can Now Automate TLS Certificate Lifecycle – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google on Thursday announced the availability of its Automatic Certificate Management Environment (ACME) API for all Google Cloud users, allowing...
Zyxel Firewalls Hacked by Mirai Botnet – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A Mirai botnet variant has been exploiting a recently patched vulnerability tracked as CVE-2023-28771 to hack many Zyxel firewalls. The...
NCC Group Releases Open Source Tools for Developers, Pentesters – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Cybersecurity firm NCC Group has released new open source tools that can be useful to application developers and penetration testers....
2 Lenses for Examining the Safety of Open Source Software – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer, Dark Reading Open source repositories — such as Python’s PyPI, the Maven Java repository, and the Node Package...
130K+ Patients’ Social Security Numbers Leaked in UHS of Delaware Data Breach – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 MARLTON, N.J., May 25, 2023 /PRNewswire/ — Approximately 130,000 patients in Texas — and an untold number of others nationwide — are being notified...
Tesla Whistleblower Leaks 100GB of Data, Revealing Safety Complaints – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading German newspaper Handelsbatt reported today that it received 100GB of data from informants at Tesla, containing information...
Travel-Themed Phishing, BEC Campaigns Get Smarter as Summer Season Arrives – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nathan Eddy, Contributing Writer, Dark Reading As the summer holiday season draws near, phishing scams with travel-themed lures have been gaining momentum,...
New PowerExchange Backdoor linked to an Iranian APT group – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini An alleged Iran-linked APT group targeted an organization linked to the United Arab Emirates (U.A.E.) with the new PowerExchange backdoor....