Home News Page 6

News

News from the cyber security world and abroad. Enjoy current affairs of the cyber underground and more. Browse popular news articles covering hackers and cybercrimnals alike. Discover new vulnerabilities and emerging threats that we cover. Looking for Malware or data breach related articles? Than the cyber post has all the cybersecurity information you can take in!

In addition to current affairs, we like to educate our readers. For instance, we have a learning section. Head over to our educational section and enjoy. Read some great tips and articles for securing your accounts and data. Protect yourself from phishing and basic password vulnerabilities. Looking for something more exciting to read? Than maybe some darknet stories will tickle your fancy. But sit back and enjoy exciting cybercrime stories from the darkweb. Learn of arrests and the data that carders and fraudsters peddle in.

Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity

0
In July 2020, Mandiant Threat Intelligence released a public report detailing an ongoing influence campaign we named “Ghostwriter.” Ghostwriter is a cyber-enabled influence campaign which primarily targets audiences in...
dark reading threat intel and cybersecurity news

Attackers Exploited 4 Zero-Day Flaws in Chrome, Safari & IE

0
At least two government-backed actors -- including one Russian group -- used the now-patched flaws in separate campaigns, Google says. The latest evidence of a troubling increase in zero-day exploit...

OX App Suite / OX Guard / OX Documents SSRF / Cross Site Scripting

Authored by Martin Heiland Open-Xchange OX App Suite, OX Guard, and OX Documents suffer from server-side request forgery and cross site scripting vulnerabilities. Some of these issues only affect version...

Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?

0
In this cloud-native world, applications are more assembled than built. Instead of starting from scratch, developers leverage ready-made code components that were previously built and open sourced by others....

6 Key Kubernetes DevSecOps Principles: People, Processes, Technology

0
Container-based application deployment is at its peak, as is the popularity of orchestration platforms like Kubernetes that form the underlying infrastructure for containerized applications. Because of its ability to...

A Message From Dread Admins on the Topic of Stability

0
Paris, one of the administrators of Dread, posted an update on Dread about the ongoing issues involving Dread and the Tor network as a whole. The update is available...

Dream Market Vendor “Rackjaw2” Sentenced to Prison

0
A 52-year-old from Everett, Washington, was sentenced to four years in prison for selling methamphetamine and heroin on the darkweb.U.S. Attorney Brian T. Moran announced that a U.S. District...

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

0
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. New research indicates that over 80,000 Hikvision surveillance cameras in the world...

Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for...

0
When you’re developing a cloud-native web application, it can feel as if you’re building a kingdom. The success of your application and company depends on a strong and scalable...

9 Essential Infrastructure Security Considerations for Kubernetes

0
Part of the reason why securing Kubernetes can be challenging is that Kubernetes isn’t a single, simple framework. It’s a complex, multi-layered beast. Each layer — from code and...
Error decoding the Instagram API json