Magento Based Stores See Biggest Attack Due to 0day flaw

0
Well-known cybersecurity expert and founder of Sanguine Security (SanSec) Willem de Groot (Willem de Groot) warned of the largest ever campaign aimed at compromising online stores based on the e-commerce platform...

Bad Bots – How To Fight Them and What Are They

Author: Asim Rahal Bad internet bot traffic rose by 18.1% in 2019, and it now accounts for nearly one-quarter of all internet traffic The figure above, which comes from Imperva’s 2020 Bad...

Facebook Sponsors 0day Exploit For Tails OS To Help The FBI Catch A Pedophile

Facebook helped the FBI catch a pedophile and sponsored the creation of a 0-day exploit for Tails An amazing story was published on its pages by Vice Motherboard . It turned out that...

North Korean Hackers target UN Security Members

0
New UN Security Council report reveals repeated targeting of UN Security Council officials over the past year By Catalin Cimpanu  Today's security threats have expanded in scope and seriousness. There can now...

Google is indexing the phone numbers of WhatsApp Users

A researcher is warning that Google is indexing the phone numbers of WhatsApp users raising serious privacy concerns. Google is indexing the phone numbers of WhatsApp users that could be...
The Digital Iron Curtain. Russia Prepares for a Total Ban on VPNs.

The Digital Iron Curtain. Russia Prepares for a Total Ban on VPNs.

By: Jeremiah Fowler Cybersecurity Researcher What Does it Mean for Personal Privacy, Secure Communication, and Access to Information? Russian sources have announced that a ban on VPN services will go into...

Monero-Mining Campaign Blue Mockingbird Exploits Web Apps

The cybercriminals are utilizing a deserialization weakness, CVE-2019-18935, to accomplish remote code execution before moving horizontally through the enterprise. A Monero digital currency mining effort has developed that abuses a...

MFA-Minded Attackers Continue to Figure Out Workarounds

0
While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue. By: Robert Lemos As online users become increasingly aware of and use multifactor authentication (MFA),...

Misconfigured Kubernetes Target Of XMRig Mining Campaign

XMRig Campaign Target Misconfigured Kubernetes to Mine Cryptocurrency Kubernetes clusters, due to their cloud computing capabilities and widespread use, are the perfect target for crypto-mining campaigns. A widespread XMRig Monero-mining...

Google Analytics Used By Cybercriminals to Steal Credit Card Data

Attackers inject malicious code that collects payment data onto a hacked site. Cybercriminals use Google Analytics to steal credit card information from compromised e-commerce sites. According to experts from Kaspersky Lab,...
Error decoding the Instagram API json