Hackers attack Wikipedia to display Nazi signs in several pages
The Holocaust is probably the darkest chapter in modern history, taking the lives of more than 6 million people killed with extreme cruelty by the Nazi regime. This is anRead More →
The Holocaust is probably the darkest chapter in modern history, taking the lives of more than 6 million people killed with extreme cruelty by the Nazi regime. This is anRead More →
Cybersecurity specialists report the detection of a cross-site scripting (XSS) vulnerability in SEOPress, a popular WordPress plugin for search engine optimization (SEO), allowing webmasters to manage SEO metadata, social mediaRead More →
Security issues in the GNU C library (gblic) can be disastrous for Linux users. An example of this is CVE-2021-33574, a vulnerability that would have allowed threat actors to causeRead More →
Cybersecurity specialists reported the discovery of a severe flaw in the design of some middlebox models, a term referring to computer network devices that transform, inspect, filter and manipulate trafficRead More →
After rebranding themselves as a new operation dubbed as El_Cometa, the SynAck ransomware group decided to publish the master keys for the decryption of systems infected by this malware variant.Read More →
Security teams at telecommunications firm T-Mobile are investigating a data breach after a hacker appeared claiming he has access to the records of some 100 million customers. The investigation beganRead More →
Phishing remains one of the most common and dangerous criminal practices for users in general, and every day new and dangerous tools emerge to deploy this attack variant. On thisRead More →
Telegram has become one of the best instant messaging tools, currently being the main counterpart of WhatsApp thanks to its advanced privacy and anonymity capabilities. Even today, there are manyRead More →
Cybersecurity specialists report the detection of a critical vulnerability in Cortex XSOAR, the detection and response platform executed on fully integrated endpoint, network and cloud data developed by Palo AltoRead More →
Cybersecurity specialists report the detection of three critical vulnerabilities in Node.js, the popular open-source, real-time, cross-platform execution environment based on the JavaScript programming language. The first of the reported flaws,Read More →
Europol announced that it will initiate legal proceedings against 23 people accused of participating in a business email engagement (BEC) operation that would have resulted in losses of up toRead More →
This morning, Microsoft security teams issued an alert related to the detection of a new vulnerability in the Windows Print Spooler service. Tracked as CVE-2021-36958, this flaw exists due toRead More →
Just a few hours ago the heads of the Poly Network platform confirmed that a hacking group managed to steal more than $613 million USD in cryptocurrency, in what couldRead More →
Tech firm Accenture has confirmed that its systems were compromised by a ransomware attack allegedly deployed by LockBit 2.0 operators. In addition to encrypting thousands of files, hackers threaten toRead More →
Cybersecurity specialists report remote code execution (RCE) vulnerability detection and privilege escalation on cPanel &WHM, the popular web hosting platform. According to the report, these flaws can be exploited throughRead More →
Microsoft announced that they will begin implementing a default configuration in the way the Windows system employs the Print Spooler print driver in an attempt to eliminate once and forRead More →
In early August, Group-IB researchers began tracking unusual activity on a hacking forum specializing in selling stolen payment cards. According to the researchers, the user AW_cards posted a link thatRead More →
Cybersecurity specialists report the detection of a malicious campaign targeting Android users in order to hijack their Facebook accounts by stealing session cookies. Identified as FlyTrap, this campaign is basedRead More →
A recent security report notes that the confidential information of more than 57,000 StarHub customers has been leaked in what appears to be a severe oversight by the Singapore-based telecommunicationsRead More →
Researcher Haya Shulman of the Fraunhofer Institute for Secure Information Technology in Germany reported the discovery of a critical vulnerability in Let’s Encrypt that would allow threat actors to evadeRead More →