InfoSec Defence
Cyber Attack
Malware Attack
Vulnerabilities
Ransomware
Reports
New In Technology
Patches
Cyber Attack
Malware Attack
Vulnerabilities
Ransomware
Reports
New In Technology
Patches
Cyber Attack
Cisco ASA Devices Compromised by Zero-Day Exploits
By
|
Admin
|
2024-04-25
Reports
Exploited Vulnerability Impacts Thousands of Palo Alto Firewalls
Cyber Attack
Critical Vulnerability in Citrix UberAgent Enables Privilege Escalation
Cyber Attack
Hackers Exploit OpenMetadata Apps in Kubernetes for Cryptomining
Vulnerabilities
Researchers Uncover Windows Vulnerabilities Allowing Rootkit-Like Capabilities
Vulnerabilities
CISA Advisory Highlights Critical ICS Device Vulnerabilities with No Immediate Fixes
Patches
CrushFTP Urges Immediate Patching for Exploited Zero-Day Vulnerability
Cyber Attack
Serious Vulnerability in Forminator Plugin Affects 300,000+ WordPress Websites
Cyber Attack
Security Breach Reported for Cisco Duo's Multifactor Authentication Service
Vulnerabilities
Intel and Lenovo Servers Affected by 6-Year-Old BMC Vulnerability
Cyber Attack
Roku Reports 576,000 User Accounts Compromised Following Second Security Incident
Cyber Attack
Targus Discloses Cyberattack Following Detection of Hackers on File Servers
Ransomware
Hoya, Optics Leader, Faces $10 Million Ransomware Demand
Vulnerabilities
Palo Alto Networks Issues Alert About Firewall Vulnerability Being Exploited
Malware Attack
New Raspberry Robin Malware Campaign Spreads via Malicious Windows Script Files (WSFs)
Malware Attack
Sophisticated Multi-Stage Attack Delivers Various Malware via Invoice Phishing
Cyber Attack
Hackers Breach Government Consulting Firm, Steal 340,000 Social Security Numbers
Ransomware
Health Data of 533,000 Individuals Stolen by GHC-SCW Ransomware Gang
Cyber Attack
Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel
Vulnerabilities
Cisco Resolves High-Severity Vulnerability in IOS Software for Catalyst 6000 Series Switches
Cyber Attack
Hackers Exploit Thousands of Compromised WordPress Sites for Crypto Scams
Cyber Attack
Magento Flaw Exploited by Threat Actors to Inject Persistent Backdoor into E-commerce Websites
Vulnerabilities
Backdoor Account Found on Over 92,000 Exposed D-Link NAS Devices
Patches
Apache HTTP Server Vulnerability Enables Injection of Malicious Headers and HTTP/2 Denial-of-Service
Cyber Attack
95,000 User Personal Records Compromised in XpressBees Data Leak
Reports
Midnight Blizzard Causes US Government Impact in Microsoft Breach
Vulnerabilities
Regulator Warns of Increasing Vulnerability to Cyberattacks in US Electric Grid
Reports
Sophos Report: Cybercriminals Exploit Remote Desktop Protocol in 90% of Cyber Attacks
Vulnerabilities
Researcher Earns $5,500 Bounty for Discovering SQL Injection Vulnerability in LayerSlider WordPress Plugin
Vulnerabilities
Newly Discovered HTTP/2 Vulnerabilities Enable "CONTINUATION Flood" Denial of Service Attacks
Malware Attack
Phishing Campaign Impersonating "Federal Bureau of Transportation" Targets Oil & Gas Sector
Ransomware
Jackson County Declares State of Emergency Following Ransomware Attack
Ransomware
Harvard Pilgrim Health Network Revises Data Breach Total to Nearly 2.9 Million
Patches
Cisco Fixes Multiple Vulnerabilities in IOS and IOS XE Software, Potentially Triggering Denial-of-Service (DoS) Attacks
Vulnerabilities
Cisco Issues Recommendations to Mitigate Password-Spraying Attacks on VPN Services
Vulnerabilities
Recent Linux Vulnerability Poses Risk of User Password Disclosure and Clipboard Hijacking
Malware Attack
PyPI Halts New User Registrations to Thwart Malware Campaign
Vulnerabilities
CISA Issues Warning on Exploited Microsoft SharePoint Vulnerabilities
Malware Attack
Android Phones Transformed into Proxies by Free VPN Apps on Google Play
Ransomware
Agenda Ransomware Unleashes Enhanced Virtual Machine-Focused Attack Worldwide
Cyber Attack
Global Victims Afflicted by 'Darcula' Phishing Operation as a Service
Vulnerabilities
New Tool "BlueDucky" Exploits Bluetooth Vulnerability for 0-Click Code Execution
Cyber Attack
Hackers Exploit Vulnerability in Ray Framework to Breach Servers and Hijack Resources
Malware Attack
The Moon Malware Infects 6,000 ASUS Routers Within 72 Hours to Serve as Proxies
Vulnerabilities
Input Validation Flaw in MobSF Pen-Testing Tool Leads to SSRF Vulnerability
Cyber Attack
Hackers Allegedly Gain Unauthorized Entry to Fortinet Devices Across Multiple Companies
Cyber Attack
Developers on GitHub Targeted in Sophisticated Supply Chain Cyberattack
Cyber Attack
Raspberry Pi Transformed by Hackers into an Online Anonymity Tool
Reports
New Phishing Attacks Unleash StrelaStealer on Over 100 EU and US Organizations
Malware Attack
AndroxGh0st Malware Targets Laravel Applications to Extract Cloud Credentials
Vulnerabilities
UAE Cybersecurity Council Warns of High-Risk Vulnerabilities in Google Chrome
Cyber Attack
Belgian Grand Prix Email Account Compromised for Phishing Scam
Cyber Attack
Critical Denial-of-Service Attacks Target UDP-Based Network Communications
Reports
Report: Hundreds of Government Units and Companies in China Compromised by Cyberattacks
Vulnerabilities
'GoFetch' Vulnerability Exposes Apple Silicon's Encryption Weakness
Cyber Attack
New Phishing Campaign Targets US Organizations with NetSupport RAT
Vulnerabilities
New Technique Puts Millions of Windows Domains at Risk, Warns Akamai Researchers
Malware Attack
Malicious Sign1 Malware Campaign Hits 39,000 WordPress Websites
Reports
Russian State Hackers Launch Targeted Phishing Campaigns in Global Espionage Efforts
New In Technology
Pwn2Own Vancouver 2024 Wraps Up with Hackers Earning Over $1.1 Million and Exploiting 29 Zero-Day Vulnerabilities
Malware Attack
Corporate Phishing Campaign Utilizing 'Fluffy Wolf' Disseminates Meta Stealer
Cyber Attack
EPA and White House Issue Warning: US Water Systems Under Cyberattack Threat
Vulnerabilities
Oracle cautions that macOS 14.4 update disrupts Java functionality on Apple CPUs
Cyber Attack
Security Oversight Exposes 19 Million Passwords in Firebase Instances, Unencrypted
Cyber Attack
New Cyberattack Method "Conversation Overflow" Targets Executives by Evading AI Security
Malware Attack
Malware Threatens Over 100,000 Projects on GitHub
Cyber Attack
Hackers Allegedly Leak Over 70 Million Records Purportedly Obtained from AT&T
Cyber Attack
Fujitsu Discovers Malware Infection, Confirms Customer Data Breach
Vulnerabilities
Novel Proof-of-Concept Attack Reveals ChatGPT Vulnerabilities
Cyber Attack
Hackers leverage Aiohttp vulnerability to target susceptible networks
Cyber Attack
IMF Discloses Cyber Incident: 11 Email Accounts Compromised
Cyber Attack
Financial Services Firm WeRize Falls Victim to Data Breach
Cyber Attack
Hackers Employ Weaponized PDFs to Distribute Remcos RAT
Vulnerabilities
Vulnerabilities in ChatGPT Plug-in Pose Risk of Exposing Sensitive Data
Cyber Attack
Data Breach at French Unemployment Agency Affects 43 Million Individuals
Reports
Report: Exploitation of eSIM Vulnerabilities by SIM Swappers for Phone Numbers
Patches
Chipmakers Intel and AMD Release Patches to Address New Microarchitectural Vulnerabilities
Ransomware
StopCrypt Ransomware Evades Detection, Becomes Widely Distributed
Vulnerabilities
CERT-In Issues Alert Regarding Numerous Security Vulnerabilities Impacting Latest Android Versions
Cyber Attack
Russian-Backed Hacktivists Launch DDoS Cyberattack on Alabama
Malware Attack
New PixPirate Banking Trojan for Android Uses Innovative Technique to Stay Hidden on Phones
Patches
Cisco Addresses Critical Vulnerabilities in IOS RX
Vulnerabilities
Researchers Outline Kubernetes Vulnerability Allowing Windows Node Takeover
Cyber Attack
French Government Reports Unprecedented Surge in Cyberattacks
Cyber Attack
Advanced Vishing Campaigns Sweep Across the Globe
Vulnerabilities
Study Reveals Cybersecurity Risks from Misconfigured Microsoft SCCM Systems
Patches
Microsoft Patch Actively Exploited Admin-to-Kernel Vulnerability
Cyber Attack
15,000 Compromised Roku Accounts Sold online
Vulnerabilities
Proof-of-Concept Exploit Released for Critical Progress Software OpenEdge Vulnerability
Cyber Attack
Hackers Exploit Vulnerability in Popup Builder Plugin, Infecting 3,300 WordPress Sites with Malware
Malware Attack
WogRAT Malware Targets Windows and Linux Systems Through Exploited Notepad Service
Cyber Attack
Magnet Goblin Exploits 1-Day Vulnerabilities for Financial Gain
Cyber Attack
CISA Discloses Breach, Shuts Down Systems Amidst Cybersecurity Concerns
Vulnerabilities
Critical SSL VPN Flaw in FortiOS Warned by Fortinet, Potentially Exploited in Active Attacks
Cyber Attack
Critical Flaw in JetBrains TeamCity Exploited; 1.4k Servers Compromised
Patches
AnyCubic Resolves 3D Printer Zero-Day Vulnerability with Firmware Update
Cyber Attack
Cyber Attack Impacts Duvel Beer Production
Patches
Cisco Releases Patch for Critical VPN Hijacking Vulnerability in Secure Client
Cyber Attack
WordPress Sites Exploited: Visitors' Browsers Used for Distributed Brute-Force Attacks
Cyber Attack
Bifrost Trojan's Linux Variants Employ Typosquatting to Evade Detection
Vulnerabilities
Critical Authentication Bypass Flaw in QNAP NAS Devices Prompts Warning
Malware Attack
Python-Based Snake Info Stealer Spreads via Facebook Messages
Malware Attack
Golang Malware Targets Docker, Hadoop, Redis, and Confluence Systems, Warns Security Experts
Cyber Attack
Hackers Exploit QEMU for Covert Network Traffic Tunneling in Cyberattacks
Cyber Attack
Online Leak Exposes Millions of Google, WhatsApp, and Facebook 2FA Security Codes
Ransomware
Hamilton City Hit by Ransomware Attack, Services Paralyzed for First Time
Patches
Hikvision Addresses High-Severity Vulnerability in Security Management System with Patch
Ransomware
BlackCat Ransomware Shuts Down Servers Amid Allegations of $22 Million Ransom Theft
Cyber Attack
Hackers of TA577 Group Shift Tactics, Utilizing Phishing to Snatch NTLM Authentication Hashes
Ransomware
U.S. Agencies Warn of Phobos Ransomware Targeting Critical Infrastructure
Vulnerabilities
CISA Issues Warning: Malware Exploits Microsoft Streaming Bug
Cyber Attack
Malicious AI Models on Hugging Face Threaten Users' Machines
Malware Attack
GTPDOOR Malware: A Threat Targeting Telecoms, Exploiting GPRS Roaming Networks
Vulnerabilities
VoltSchemer's Exploit Enables Wireless Charger Takeovers
Cyber Attack
Major Brands' Subdomains Hijacked in Extensive Spam Campaign
Malware Attack
Pikabot Unveils Latest Tricks: A Return with Surprising Innovations
Vulnerabilities
US and Allied Nations Issue Warning: Russian Hackers Transitioning to Cloud Attacks
New In Technology
Breaking Ground: US-India Cybersecurity Initiative Launched to Fortify IT Connections
Ransomware
Blackcat Ransomware Attack on UnitedHealth Unit Causes US Pharmacy Outage, Sources Report
Cyber Attack
Hackers Exploit 14-Year-Old CMS Editor on Government and Education Websites for SEO Poisoning
Cyber Attack
RCMP Confirms Cyber Attack, Assures No Impact on Operations
New In Technology
CISA, EPA, and FBI Unite to Strengthen Cybersecurity for Water Systems
Malware Attack
Rhadamanthys Stealer: A New Cyber Threat to the Oil and Gas Industry
Vulnerabilities
Exploitation of New ScreenConnect RCE Flaw in Ransomware Attacks
Reports
Stolen Credentials Identified as Primary Risk in X-Force Threat Intelligence Index 2024
Cyber Attack
Francis Howell Schools, Missouri, Offline Following Cyber Attack
Cyber Attack
Hackers Strike Malawi, Prompting Suspension of Passport Issuance
Cyber Attack
Change Healthcare Confirms Cyber Attack, Disrupting Systems Across US Healthcare
Reports
New Cybersecurity Report from CrowdStrike Shows Cloud Attacks Surge by 75%
Ransomware
PSI, Control Systems Firm, Faces Uphill Battle in Ransomware Attack Recovery
Vulnerabilities
VMware Urges Admins: Remove Deprecated, Vulnerable Authentication Plug-In
Ransomware
Cactus Ransomware Group Claims 1.5TB Data Theft from Schneider Electric
Malware Attack
RatMilad can secretly record your phone calls
Trending News
Cyber Attack
Cisco ASA Devices Compromised by Zero-Day Exploits
Reports
Exploited Vulnerability Impacts Thousands of Palo Alto Firewalls
Cyber Attack
Critical Vulnerability in Citrix UberAgent Enables Privilege Escalation
Cyber Attack
Hackers Exploit OpenMetadata Apps in Kubernetes for Cryptomining
Cyber Attack
Cisco ASA Devices Compromised by Zero-Day Exploits
Critical Vulnerability in Citrix UberAgent Enables Privilege Escalation
Hackers Exploit OpenMetadata Apps in Kubernetes for Cryptomining
Reports
Exploited Vulnerability Impacts Thousands of Palo Alto Firewalls
Midnight Blizzard Causes US Government Impact in Microsoft Breach
Sophos Report: Cybercriminals Exploit Remote Desktop Protocol in 90% of Cyber Attacks
Categories
Cyber Attack
Malware Attack
Vulnerabilities
Ransomware
Reports
New In Technology
Patches
Popular Posts
Cyber Attack
Cisco ASA Devices Compromised by Zero-Day Exploits
Reports
Exploited Vulnerability Impacts Thousands of Palo Alto Firewalls
Cyber Attack
Critical Vulnerability in Citrix UberAgent Enables Privilege Escalation
Cyber Attack
Hackers Exploit OpenMetadata Apps in Kubernetes for Cryptomining
Vulnerabilities
Researchers Uncover Windows Vulnerabilities Allowing Rootkit-Like Capabilities
Vulnerabilities
CISA Advisory Highlights Critical ICS Device Vulnerabilities with No Immediate Fixes
Patches
CrushFTP Urges Immediate Patching for Exploited Zero-Day Vulnerability
Cyber Attack
Serious Vulnerability in Forminator Plugin Affects 300,000+ WordPress Websites
New In Technology
Pwn2Own Vancouver 2024 Wraps Up with Hackers Earning Over $1.1 Million and Exploiting 29 Zero-Day Vulnerabilities
Breaking Ground: US-India Cybersecurity Initiative Launched to Fortify IT Connections
CISA, EPA, and FBI Unite to Strengthen Cybersecurity for Water Systems