25 Aug Microsoft: Stealthy Flax Typhoon hackers use LOLBins to evade detection Microsoft has identified a new hacking group it now tracks as Flax Typhoon that argets government agencies and education, critical manufacturing, and information technology organizations likely for espionage purposes. […]
25 Aug Leaseweb is restoring ‘critical’ systems after security breach Leaseweb, one of the world’s largest cloud and hosting providers, notified people that it’s working on restoring “critical” systems disabled following a recent security breach. […]
25 Aug Kroll data breach exposes info of FTX, BlockFi, Genesis creditors Multiple reports on social media warn of a data breach at financial and risk advisory company Kroll that resulted in exposing to an unauthorized third-party the personal data of some credit claimants. […]
24 Aug FBI warns of patched Barracuda ESG appliances still being hacked The Federal Bureau of Investigation warned that patches for a critical Barracuda Email Security Gateway (ESG) remote command injection flaw are “ineffective,” and patched appliances are still being compromised in ongoing attacks. […]
24 Aug Ransomware hackers dwell time drops to 5 days, RDP still widely used Ransomware threat actors are spending less time on compromised networks before security solutions sound the alarm. In the first half of the year the hackers’ median dwell time dropped to five days from nine in 2022 […]
24 Aug Jupiter X Core WordPress plugin could let hackers hijack sites Two vulnerabilities affecting some version of Jupiter X Core, a premium plugin for setting up WordPress and WooCommerce websites, allow hijacking accounts and uploading files without authentication. […]
24 Aug New Whiffy Recon malware uses WiFi to triangulate your location Cybercriminals behind the Smoke Loader botnet are using a new piece of malware called Whiffy Recon to triangulate the location of infected devices through WiFi scanning and Google’s geolocation API. […]
24 Aug Exploit released for Ivanti Sentry bug abused as zero-day in attacks Proof-of-concept exploit code is now available for a critical Ivanti Sentry authentication bypass vulnerability that enables attackers to execute code remotely as root on vulnerable systems. […]
23 Aug Lapsus$ teen hackers convicted of high-profile cyberattacks A London jury has found that an 18-year-old member of the Lapsus$ data extortion gang helped hack multiple high-profile companies, stole data from them, and demanded a ransom threatening to leak the information. […]
23 Aug Over 3,000 Openfire servers vulnerable to takover attacks Thousands of Openfire servers remain vulnerable to CVE-2023-32315, an actively exploited and path traversal vulnerability that allows an unauthenticated user to create new admin accounts. […]