17 Jan Git patches two critical remote code execution security flaws Git has patched two critical severity security vulnerabilities that could allow attackers to execute arbitrary code after successfully exploiting heap-based buffer overflow weaknesses. […]
17 Jan Hackers turn to Google search ads to push info-stealing malware Hackers are setting up fake websites for popular free and open-source software to promote malicious downloads through advertisements in Google search results. […]
17 Jan Hackers can use GitHub Codespaces to host and deliver malware GitHub Codespaces, a cloud-hosted integrated development environment (IDE), has a port forwarding feature that malicious actors can abuse to host and distribute malware to unaware developers. […]
17 Jan Over 4,000 Sophos Firewall devices vulnerable to RCE attacks Over 4,000 Sophos Firewall devices exposed to Internet access are vulnerable to attacks targeting a critical remote code execution (RCE) vulnerability. […]
16 Jan Researchers to release PoC exploit for critical Zoho RCE bug, patch now Proof-of-concept exploit code will be released later this week for a critical vulnerability allowing remote code execution (RCE) without authentication in several VMware products. […]
16 Jan MSI accidentally breaks Secure Boot for hundreds of motherboards Over 290 MSI motherboards are reportedly affected by an insecure default UEFI Secure Boot setting settings that allows any operating system image to run regardless of whether it has a wrong or missing signature. […]
16 Jan Vice Society ransomware leaks University of Duisburg-Essen’s data The Vice Society ransomware gang has claimed responsibility for the November 2022 cyberattack that forced the University of Duisburg-Essen (UDE) to reconstruct its IT infrastructure, a process that’s still ongoing. […]
16 Jan Datadog rotates RPM signing key exposed in CircleCI hack Cloud security firm Datadog says that one of its RPM GPG signing keys and its passphrase have been exposed during a recent CircleCI security breach. […]
16 Jan Malicious ‘Lolip0p’ PyPi packages install info-stealing malware A threat actor has uploaded to the PyPI (Python Package Index) repository three malicious packages that carry code to drop info-stealing malware on developers’ systems. […]
15 Jan Hackers exploit Cacti critical bug to install malware, open reverse shells More than 1,600 instances of the Cacti device monitoring tool reachable over the internet are vulnerable to a critical security issue that hackers have already started to exploit. […]