ZOOM Zero-Day Vulnerability Allows Remote Code Execution
A zero-day vulnerability in Zoom for Windows may be exploited by an attacker to execute arbitrary code on a victim’s computer. The attack doesn’t trigger a security warning and...
WastedLocker Ransomware Using Hacked Websites to Spread via Fake Software Updates
Dozens of US news sites hacked in WastedLocker ransomware attacks
By Sergiu Gatlan
Image: C Drying
The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect...
Palo Alto Networks disclose major bug that lets hackers bypass authentication on its firewall...
US Cyber Command says foreign hackers will most likely exploit new PAN-OS security bug
By Catalin Cimpanu for Zero Day
US Cyber Command said today that foreign state-sponsored hacking groups are likely to exploit...
Hacking Group CryptoCore Has Stolen Over 200 Million From Cryptocurrency Exchanges
Researchers from the Israeli company ClearSky talked about the hacker group CryptoCore , active since 2018 and specializing in hacking cryptocurrency exchanges.
According to experts, the group is based somewhere in Eastern...
Google Analytics Used By Cybercriminals to Steal Credit Card Data
Attackers inject malicious code that collects payment data onto a hacked site.
Cybercriminals use Google Analytics to steal credit card information from compromised e-commerce sites. According to experts from Kaspersky Lab,...
Vulnerabilities in old GTP protocol could affect 4G and 5G networks
Experts cautioned that problems in the GPRS Tunneling Protocol (GTP) could affect the operation of 4G and 5G networks. In reports published last week and in December 2019, Positive Technologies and A10 Networks described...
Amazon Stops Largest DDoS Ever Recorded By Their Systems
Amazon says it mitigated the largest DDoS attack ever recorded
By @JonPorty Jun 18, 2020, 7:31am EDT
An attack with a previously unseen volume of 2.3 Tbps
Amazon Web Services recently had to defend...
FBI Reveals Cryptocurrency Hacks & Cyebrcrime Rose 75% During COVID-19 Pandemic
KEY POINTS
Online crime increased by 75% during the COVID-10 pandemicSome of the crimes are enabled by cryptocurrencies, due to which increased regulations are being proposedWork-from-home employees are targeted by...
Misconfigured Kubernetes Target Of XMRig Mining Campaign
XMRig Campaign Target Misconfigured Kubernetes to Mine Cryptocurrency
Kubernetes clusters, due to their cloud computing capabilities and widespread use, are the perfect target for crypto-mining campaigns. A widespread XMRig Monero-mining...
Air gapped hacking becoming a treasure trove of data for Hackers
Air-Gapped Systems are Becoming a Treasure Trove for Attackers
For years, air-gapping has been recommend as a standard cybersecurity practice to protect sensitive systems and networks. Often, organizations isolate their...