Billions of Thai Internet Records Leaked
Over 8 billion real-time Internet records of users of Thailand’s largest cell network, Advanced Info Service (AIS), were leaked due to a misconfigured Elasticsearch database.
What happened
Security researcher Justin Paine...
WordPress Plugin PageLayer leaves 200k sites vulnerable
Author: Sergiu Gatlan
Two high severity security vulnerabilities found in the PageLayer plugin can let attackers to potentially wipe the contents or take over WordPress sites using vulnerable plugin versions.
PageLayer is a WordPress...
Pakistan Telecom Firms Hit By Greenbug Hacking Group
For the past several months, suspected Iranian hackers have been rooting around the IT systems of at least three telecommunications companies in Pakistan, accessing data servers when it suits...
APT Group From Iran targets Governments In Saudi Arabia and Kuwait
Today, cybersecurity researchers shed light on an Iranian cyber espionage campaign directed against critical infrastructures in Kuwait and Saudi Arabia.
Bitdefender said the intelligence-gathering operations were conducted by Chafer APT (also known...
Adobe Critical Vulnerability Patch Released
Adobe has released an unscheduled critical vulnerability fix ( CVE-2020-9586 ) in its Adobe Character Animator motion capture application. Exploiting the vulnerability allows an attacker to remotely execute code on a vulnerable...
Senate Vote An The FBIs Warrant-less Claim To Your Browsing History. Will a VPN...
(Getty Images)
As many of you are aware, the US Senate recently passed a bill to extend elements of the Patriot Act. Notably, this legislation included parts that would increase the FBI and...
European Parliament Warns of Leaked Data
Leaked data includes, but is not limited to, confidential information and encrypted passwords.
Information on more than a thousand employees and members of the European Parliament was made publicly available,...
A New RAT That is Controlled Via HTTP Status Commands
A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign...
How A College Student Made 10k From Bug Bounties
Author: Tilson Galloway
API keys, passwords, and customer data are accidentally posted to GitHub every day.
Hackers use these keys to login to servers, steal personal information, and rack up absurd...
Magellan Health Hit by Ransomware and Data Breach
Logins, personal information and tax info were all exfiltrated ahead of the ransomware attack, thanks to a phishing email.
UPDATE
Magellan Health, the Fortune 500 insurance company, has reported a ransomware...