Home News

News

News from the cyber security world and abroad. Enjoy current affairs of the cyber underground and more. Browse popular news articles covering hackers and cybercrimnals alike. Discover new vulnerabilities and emerging threats that we cover. Looking for Malware or data breach related articles? Than the cyber post has all the cybersecurity information you can take in!

In addition to current affairs, we like to educate our readers. For instance, we have a learning section. Head over to our educational section and enjoy. Read some great tips and articles for securing your accounts and data. Protect yourself from phishing and basic password vulnerabilities. Looking for something more exciting to read? Than maybe some darknet stories will tickle your fancy. But sit back and enjoy exciting cybercrime stories from the darkweb. Learn of arrests and the data that carders and fraudsters peddle in.

Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data

0
CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers. The Cybersecurity and Infrastructure Security Agency (CISA) and Coast Guard Cyber Command (CGCYBER) released...

Mitel VoIP Bug Exploited in Ransomware Attacks

0
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments. Ransomware groups are abusing unpatched versions of a Linux-based Mitel...

Overview of Top Mobile Security Threats in 2022

0
By: The Hacker News Your smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking medical appointments. However, the...

APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor

0
By: Ravie Lakshmanan Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack campaign that targets unpatched Microsoft Exchange Servers as an initial access vector to...
dark reading threat intel and cybersecurity news

New Vulnerability Database Catalogs Cloud Security Issues

Organizations traditionally have struggled to track vulnerabilities in public cloud platforms and services because of the lack of a common vulnerability enumeration (CVE) program like the one that MITRE maintains...
dark reading threat intel and cybersecurity news

Ransomware Volume Nearly Doubles 2021 Totals in a Single Quarter

After a 2021 beleaguered by ransomware, attack volumes continue to balloon in 2022. In fact, a report issued Tuesday indicates that in just the first three months of this year,...
dark reading threat intel and cybersecurity news

Atlassian Confluence Exploits Peak at 100K Daily

Since it was first identified on June 2, the Atlassian Confluence remote code-execution (RCE) vulnerability tracked as CVE-2022-26134 has attracted the repeated attention of threat actors. Now, after peaking...
dark reading threat intel and cybersecurity news

China-Backed APT Pwns Building-Automation Systems with ProxyLogon

A previously unknown Chinese-speaking advanced persistent threat (APT) is exploiting the ProxyLogon Microsoft Exchange vulnerability to deploy the ShadowPad malware, researchers said — with the end goal of taking...
dark reading threat intel and cybersecurity news

LockBit 3.0 Debuts with Ransomware Bug Bounty Program

The LockBit ransomware group just released its latest ransomware-as-a-service offering, LockBit 3.0, and along with it a first for the Dark Web: a bug-bounty program. The bounty program offers up...
Error decoding the Instagram API json