Security

Security news and articles from the cyber world. Enjoy exciting cyber security stories and news articles updated daily. The Cyber Post brings you the latest updates on cybersec. Therefore, we cover categories from hackers to exploits and vulnerabilities.

So learn how to secure your computer, your data and your own personal identity. If that is not enough than check out some articles on how to protect the cloud environment. Maybe you are looking for information regarding exploits and current vulnerabilities? Even more the cyber post has tons of information on the latest vulnerabilities.

dark reading threat intel and cybersecurity news

Hackers Score Nearly $1M at Device-Focused Pwn2Own Contest

0
Security researchers and hackers demonstrated 63 zero-day vulnerabilities in popular devices at the latest Pwn2Own, exploiting printers from Canon, HP, and Lexmark, and routers and network-attached storage device from...
dark reading threat intel and cybersecurity news

Security Flaw in Atlassian Products Affecting Multiple Companies

0
BENGALURU, December 13, 2022 — Researchers at CloudSEK observed that for Atlassian products - Jira, Confluence, and BitBucket, cookies are not invalidated, even if the password is changed, with...

Hackers copied Mango Markets attacker’s methods to exploit Lodestar — CertiK

0
Blockchain security company CertiK has shared a post-mortem analysis of the $5.8 million Lodestar Finance exploit that occurred on Dec. 10:5. The hacker burned a little over 3 million...
dark reading threat intel and cybersecurity news

Metaparasites & the Dark Web: Scammers Turn on Their Own

0
Cybercriminals are often seen as parasites, feeding off a wide swath of victims of every size and stripe. But as it turns out, they've become targets in their own...
dark reading threat intel and cybersecurity news

Rash of New Ransomware Variants Springs Up in the Wild

0
Enterprise security teams can add three more ransomware variants to the constantly growing list of ransomware threats for which they need to monitor.The three variants — Vohuk, ScareCrow, and...

3Commas denies staff members stole API keys

0
Crypto trading firm 3Commas has denied its employees' stole user's API keys, claiming that screenshots circulating on social media are fake and urging affected users to file police reports...

Hackers copied Mango Markets attacker’s methods to exploit Lodestar: CertiK

0
According to a post-mortem analysis provided by CertiK of the $5.8 million Lodestar Finance exploit that occurred on Dec. 10, 5. The hacker burned a little over 3 million in...

Abnormal token price movements on Binance not hack-related, confirms CZ

0
Crypto exchange Binance began investigating suspicious behavior on its platform after noticing abnormal price movements for certain trading pairs involving Sun Token (SUN), Ardor (ARDR), Osmosis (OSMO), FUNToken (FUN)...

Lodestar Finance exploited in flash loan attack

0
Arbitrum-based lending protocol Lodestar Finance was exploited in a flash loan attack on Dec. 10. According to Lodestar, the attacker manipulated the price of the plvGLP token before borrowing...
dark reading threat intel and cybersecurity news

TikTok Banned on Govt. Devices; Will Private Sector Follow Suit?

0
Texas this week become the fifth US state to ban the TikTok app on government-owned devices over concerns about the social media app harvesting sensitive data from user devices...