08 Apr Google Chrome blocks a new port to stop NAT Slipstreaming attacks Google Chrome is now blocking HTTP, HTTPS, and FTP access to TCP port 10080 to prevent the ports from being abused in NAT Slipstreaming 2.0 attacks. […]
08 Apr Over 600,000 stolen credit cards leaked after Swarmshop hack The hacking spree targeting underground marketplaces has claimed another victim as a database from card shop Swarmshop emerged on another forum. […]
08 Apr Belden says health benefits data stolen in 2020 cyberattack Belden has disclosed that additional data was accessed and copied during their November 2020 cyberattack related to employees’ healthcare benefits and family members covered under their plan. […]
08 Apr Microsoft releases a cyberattack simulator – Shall we play a game? Microsoft has released an open-source cyberattack simulator that allows security researchers and data scientists to create simulated network environments and see how they fare against AI-controlled cyber agents. […]
08 Apr Windows 10 hacked again at Pwn2Own, Chrome and Zoom also fall Contestants hacked Microsoft’s Windows 10 OS twice during the second day of the Pwn2Own 2021 competition, together with the Google Chrome web browser and the Zoom video communication platform. […]
07 Apr REvil ransomware now changes password to auto-login in Safe Mode A recent change to the REvil ransomware allows the threat actors to automate file encryption via Safe Mode after changing Windows passwords. […]
07 Apr Cisco fixes bug allowing remote code execution with root privileges Cisco has released security updates to address a pre-authentication remote code execution (RCE) vulnerability affecting SD-WAN vManage Software’s user management function. […]
07 Apr New Cring ransomware hits unpatched Fortinet VPN devices A vulnerability impacting Fortinet VPNs is being exploited by a new human-operated ransomware strain known as Cring to breach and encrypt industrial sector companies’ networks. […]
07 Apr Google Forms and Telegram abused to collect phished credentials Security researchers note an increase in alternative methods to steal data from phishing attacks, as scammers obtain the stolen info through Google Forms or private Telegram bots. […]
07 Apr Gigaset Android phones infected by malware via hacked update server Owners of Gigaset Android phones have been repeatedly infected with malware since the end of March after threat actors compromised the vendor’s update server in a supply-chain attack. […]