• View
Image

HPE: Sudo Flaw Grants Attackers Root Privileges to Aruba Platform

A vulnerability in Sudo, open-source software used within HP's Aruba AirWave management platform, can enable any unprivileged and unauthorized loc... Read more

Image

Data From Fujitsu is Being Sold on the Dark Web

An organisation called Marketo is selling data from Fujitsu on the dark web, although the firm claims the information "appears to be tied to cust... Read more

Image

Cybersecurity experts called the signs of smartphone hack

Fast discharge of the smartphone, the appearance of strange notifications or spam when the screen is locked, blocking antivirus programs - all this m... Read more

Image

T-Mobile CEO Apologizes for Hack of More Than 54 Million Users Data

Mike Sievert, CEO of T-Mobile, is in a spot of bother after a major data breach of the carrier’s servers. In a statement issued last week, he apologi... Read more

Image

Fraudsters launched more than 100 attacks on Russian companies in three months

Over the past three months, there has been an increase in targeted attacks on Russian companies via email During May-July 2021 Kaspersky Lab prevente... Read more

Image

Lockbit Ransomware Suspected Behind the Attacks on Envision Credit Union

Cyberattacks employing a type of ransomware that appeared nearly two years ago have increased in number lately. The ransomware known as LockBit Ranso... Read more

Image

LockFile Ransomware Circumvents Protection Using Intermittent File Encryption

A new ransomware threat known as LockFile has been affecting organizations all around the world since July. It surfaced with its own set of tactics f... Read more

Image

Phorpiex Malware has Shut Down their Botnet and Put its Source Code for Sale

The Phorpiex malware's creators have shut down their botnet and are selling the source code on a dark web cybercrime forum. The ad states that non... Read more

Image

Ragnarok Ransomware Gang Releases Free Master Decryptor After Shutdown

Ragnarok ransomware group has decided to abandon its operations and has reportedly published the master key that can decrypt files locked with their... Read more

Image

Cofense Report Analysis on Phishing Campaign Utilizing Vzwpix

Researchers at the Cofense Phishing Defense Center (PDC) have been able to dig further into the addressing characteristics of one of the phishing att... Read more

Image

Vulnerabilities Detected in Open Source elFinder File Manager

In elFinder, an open-source web file organizer, security researchers from SonarSource identified five flaws that form a severe vulnerability chain. T... Read more

Image

Researchers Discovered a Vulnerability in Microsoft Azure's Cosmos DB

According to a copy of the email and a cyber security researcher, Microsoft warned thousands of its cloud computing customers, including some of the... Read more

Image

Customers of Russian banks will be recognized by the veins with the help of a new technology

Russian banks are going to introduce customer identification by the pattern of veins on their hands. It is assumed that this method of authentication... Read more

Image

Scammers Use Fake DMCA Complaints, DDoS Threats to Deploy BazaLoader Malware

Threat actors responsible for the BazaLoader malware designed a brand-new bait to trick website owners into opening malicious files: fake notificatio... Read more

Image

Boston Public Library Affected by Cyberattack

The Boston Public Library (BPL) announced on 27th August that its network was compromised on Wednesday, resulting in a system-wide technical outage.... Read more

Image

Fraudsters Pose as Europol Chief in an Attempt to Steal Victims PayPal Account Details

The federal police's Computer Crime Unit is looking into an identity fraud case concerning Catherine De Bolle, the executive head of the EU's... Read more

Image

The FBI has Issued a Warning About the Hive Ransomware Gang

The Federal Bureau of Investigation (FBI) has issued a security alert regarding the Hive ransomware attacks, which provides technical data and indica... Read more

Image

Microsoft Issues an Advisory on ProxyShell Vulnerabilities

Microsoft this week published guidance about three vulnerabilities referred to collectively as ProxyShell days after security researchers at the U.S.... Read more

Image

Cisco Published Two Critical and Six High-Severity Patches for Nexus Gear

The American multinational technology conglomerate corporation Cisco Systems, based in San Jose, California - has published six security patches for... Read more

Image

F5 Security Patched Severe Vulnerabilities in its BIG-IP Networking Device

F5 Security has patched over a dozen critical-severity vulnerabilities in its BIG-IP networking device, including one which was classified as critica... Read more

Image

CISA Published MARs on Samples Targeting Pulse Secure Devices

Five new research reports outlining malware detected on compromised Pulse Secure devices were issued this week by the US Cybersecurity and Infrastruc... Read more

Image

Russians began to complain more often about hacking accounts on Public Services

DeviceLock, a Russian manufacturer of anti-data leakage systems, reported that the number of complaints about attempts to hack accounts on Public Ser... Read more

Image

Threat Actors Abuse Top 15 Flaws Millions of Times to Target Linux Systems

Researchers at Trend Micro, have identified and flagged nearly 14 million Linux-based systems that are directly exposed to the internet, making them... Read more