10 Jan Lorenz ransomware gang plants backdoors to use months later Security researchers are warning that patching critical vulnerabilities allowing access to the network is insufficient to defend against ransomware attacks. […]
10 Jan Microsoft fixes ODBC connections broken by November updates Microsoft has fixed a known issue affecting Windows apps using ODBC database connections after installing the November 2022 Patch Tuesday updates. […]
09 Jan Microsoft: Kubernetes clusters hacked in malware campaign via PostgreSQL The Kinsing malware is now actively breaching Kubernetes clusters by leveraging known weaknesses in container images and misconfigured, exposed PostgreSQL containers. […]
09 Jan Darknet drug markets move to custom Android apps for increased privacy Online markets selling drugs and other illegal substances on the dark web have started to use custom Android apps for increased privacy and to evade law enforcement. […]
09 Jan GitHub makes it easier to scan your code for vulnerabilities GitHub introduced a new option to set up code scanning for a repository known as “default setup,” designed to help developers configure it automatically with just a few clicks. […]
09 Jan Auth0 fixes RCE flaw in JsonWebToken library used by 22,000 projects Auth0 fixed a remote code execution vulnerability in the immensely popular ‘JsonWebToken’ open-source library used by over 22,000 projects and downloaded over 36 million times per month on NPM. […]
09 Jan Fake OnlyFans dating sites abuse UK Environment Agency open redirect Threat actors abused an open redirect on the official website of the United Kingdom’s Department for Environment, Food & Rural Affairs (DEFRA) to direct visitors to fake OnlyFans adult dating sites. […]
08 Jan Microsoft ends Windows 7 extended security updates on Tuesday Windows 7 Professional and Enterprise editions will no longer receive extended security updates for critical and important vulnerabilities starting Tuesday, January 10, 2023. […]
08 Jan Hackers push fake Pokemon NFT game to take over Windows devices Threat actors are using a well-crafted Pokemon NFT card game website to distribute the NetSupport remote access tool and take control over victims’ devices. […]
07 Jan Malicious PyPi packages create CloudFlare Tunnels to bypass firewalls Six malicious packages on PyPI, the Python Package Index, were found installing information-stealing and RAT (remote access trojan) malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access. […]