Technology Windows kernel bug now exploited in attacks to gain SYSTEM privileges Dec 16, 2024 bleepingcomputer.com CISA has warned U.S. federal agencies to secure their systems against ongoing attacks targeting a high-severity Windows kernel vulnerability. [...]
Technology 390,000 WordPress accounts stolen from hackers in supply chain attack Dec 14, 2024 bleepingcomputer.com A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat…
Technology CISA confirms critical Cleo bug exploitation in ransomware attacks Dec 13, 2024 bleepingcomputer.com CISA confirmed today that a critical remote code execution bug in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited…
Technology Cleo patches critical zero-day exploited in data theft attacks Dec 12, 2024 bleepingcomputer.com Cleo has released security updates for a zero-day flaw in its LexiCom, VLTransfer, and Harmony software, currently exploited in data theft…
Cyber Security Library of Congress Offers AI Legal Guidance to Researchers Dec 5, 2024 darkreading.com Researchers testing generative AI systems can use prompt injection, re-register after being banned, and bypass rate limits without running afoul…
Cyber Security U.S. Offered $10M for Hacker Just Arrested by Russia Dec 4, 2024 krebsonsecurity.com In January 2022, KrebsOnSecurity identified a Russian man named Mikhail Matveev as "Wazawaka," a cybercriminal who was deeply involved in…
Technology Hackers abuse popular Godot game engine to infect thousands of PCs Nov 27, 2024 bleepingcomputer.com Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and…
Technology New NachoVPN attack uses rogue VPN servers to install malicious updates Nov 26, 2024 bleepingcomputer.com A set of vulnerabilities dubbed "NachoVPN" allows rogue VPN servers to install malicious updates when unpatched Palo Alto and SonicWall…
Cyber Security New Levels, New Devils: The Multifaceted Extortion Tactics Keeping Ransomware Alive Nov 23, 2024 cyberdefensemagazine.com Having evolved from a basic premise of locking down a victim’s data with encryption, then demanding a ransom for its…
Technology Chinese hackers target Linux with new WolfsBane malware Nov 21, 2024 bleepingcomputer.com A new Linux backdoor called 'WolfsBane' has been discovered, believed to be a port of Windows malware used by the Chinese…
Windows kernel bug now exploited in attacks to gain SYSTEM privileges
CISA has warned U.S. federal agencies to secure their systems against ongoing attacks targeting a high-severity Windows kernel vulnerability. [...]
390,000 WordPress accounts stolen from hackers in supply chain attack
A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat…
CISA confirms critical Cleo bug exploitation in ransomware attacks
CISA confirmed today that a critical remote code execution bug in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited…
Cleo patches critical zero-day exploited in data theft attacks
Cleo has released security updates for a zero-day flaw in its LexiCom, VLTransfer, and Harmony software, currently exploited in data theft…
Library of Congress Offers AI Legal Guidance to Researchers
Researchers testing generative AI systems can use prompt injection, re-register after being banned, and bypass rate limits without running afoul…
U.S. Offered $10M for Hacker Just Arrested by Russia
In January 2022, KrebsOnSecurity identified a Russian man named Mikhail Matveev as "Wazawaka," a cybercriminal who was deeply involved in…
Hackers abuse popular Godot game engine to infect thousands of PCs
Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and…
New NachoVPN attack uses rogue VPN servers to install malicious updates
A set of vulnerabilities dubbed "NachoVPN" allows rogue VPN servers to install malicious updates when unpatched Palo Alto and SonicWall…
New Levels, New Devils: The Multifaceted Extortion Tactics Keeping Ransomware Alive
Having evolved from a basic premise of locking down a victim’s data with encryption, then demanding a ransom for its…
Chinese hackers target Linux with new WolfsBane malware
A new Linux backdoor called 'WolfsBane' has been discovered, believed to be a port of Windows malware used by the Chinese…