Two critical command injection vulnerabilities in Fujitsu cloud storage system allow remote…Two bugs in the web interface of a cloud storage system would allow authenticated threat actors to read, write, and even destroy backed up…Jun 10, 2022Jun 10, 2022
Two critical command injection vulnerabilities in Fujitsu cloud storage system allow remote…Two bugs in the web interface of a cloud storage system would allow authenticated threat actors to read, write, and even destroy backed up…Jun 10, 2022Jun 10, 2022
Bluetooth signals on smartphones allow tracking any user’s location by exploiting BLEA group of researchers managed to show that signals emitted by electronic devices can be identified and tracked individually. Experts at…Jun 10, 2022Jun 10, 2022
Ransomware attack targeting public schools in New Jersey forces cancellation of final examsAdministrators of the Tenafly Public Schools, Bergen County, New Jersey, that the cybersecurity issue detected Thursday morning is a…Jun 9, 2022Jun 9, 2022
Education and telecommunication organizations based in Singapore, Hong Kong, Vietnam, Cambodia, and…Researchers at security firm SentinelLabs report the detection of a new Chinese-speaking hacking group identified as Aoqin Dragon and which…Jun 9, 2022Jun 9, 2022
How to hide spoofed malicious domain when users hover above a link in a phishing email in Microsoft…A recent report indicates that Microsoft Office applications could be exposed to homograph attacks based on internationalized domain names…Jun 3, 2022Jun 3, 2022
CVE-2022–26134: Zero-day remote code execution vulnerability affecting Confluence Server and Data…Information security specialists at Volexity have discovered a remote code execution (RCE) vulnerability that resides in the latest, fully…Jun 3, 20221Jun 3, 20221
YourCyanide, a new and sophisticated ransomware variant that integrates documents into PasteBin…Specialists at Trend Micro analyzed a set of CMD-based ransomware samples that appear to have advanced capabilities for stealing sensitive…Jun 2, 2022Jun 2, 2022
Warning: New cyber criminal group Karakurt is extorting millions of companies around the worldThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a security alert about Karakurt, a cybercriminal group that…Jun 2, 2022Jun 2, 2022
Texas shooter sent death threats via Facebook Messenger before the incident; Meta AI systems…It is well known that has implemented sophisticated technology to monitor private messages sent through Facebook and Instagram to identify…May 27, 2022May 27, 2022
Exploit code to hack VMware products is publicly disclosed. PoC for CVE-2022–22972A proof of concept (PoC) code for CVE-2022–22972, a critical vulnerability in some products such as Workspace ONE Access, Identity Manager…May 27, 2022May 27, 2022
Hackers theft over $1.4 million worth of Moonbird NFT collectionA non-fungible token (NFT) collector lost more than $1.4 million due to a cyberattack involving a malicious website and social engineering…May 26, 2022May 26, 2022
Black Cat ransomware shuts down Austria’s passport and transport departments after encrypting 3,000…Black Cat ransomware group claims to have hacked some computer systems in the state of Carinthia, Austria, demanding a ransom of $5 million…May 26, 2022May 26, 2022
India relaxes cyber security incidents reporting rules and says new rules apply to MNCsCybersecurity agencies in are slightly relaxing their controversial and complex requirements for reporting on information security…May 20, 2022May 20, 2022
How to download paid applications for free from Huawei AppGallery: New vulnerability foundSince then-U.S. President Donald Trump signed an executive order to apply restrictions on Chinese technology companies, has seen its…May 20, 2022May 20, 2022
Hackers steal $1 million USD from RazorpayMedia outlets in India report that an unidentified managed to steal around $1 million from Razorpay, a payment processing company…May 19, 2022May 19, 2022
Critical vulnerability in Flux2, a Kubernetes continuous delivery tool, enables hacking between…A recently detected vulnerability affecting Flux, a popular continuous delivery (CD) tool for Kubernetes, would reportedly allow tenants to…May 19, 2022May 19, 2022
OpenSea’s Discord server was hacked: Thieves post phishing link to steal cryptocurrencyOpenSea, probably the most famous non-fungible token (NFT) market platform, has being target of another cyberattack incident. This time…May 13, 2022May 13, 2022
Threat actors could have hacked the U.S.The U.S. Drug Enforcement Administration (DEA) reports that it has begun an investigation into alleged cyberattacks that would have…May 13, 2022May 13, 2022
New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat…A group of researchers developed a tool capable of detecting errors in the way applications such as Adobe Acrobat or Microsoft Word process…May 13, 2022May 13, 2022