The incident is a reminder why organizations need to pay attention to how they store and secure data in SaaS and cloud environments.
Автор: Jai Vijayan, Contributing Writer
For Just $20, Researchers Seize Part of Internet Infrastructure
Their findings highlight the frailty of some of the mechanisms for establishing trust on the Internet.
‘Hadooken’ Malware Targets Oracle’s WebLogic Servers
An attacker is using the tool to deploy a cryptominer and the Tsunami DDoS bot on compromised systems.
Microsoft Discloses 4 Zero-Days in September Update
This month’s Patch Tuesday contains a total of 79 vulnerabilities — the fourth largest of the year.
Akira Ransomware Actors Exploit SonicWall Bug for RCE
CISA has added CE-2024-40766 to its Known Exploited Vulnerabilities catalog.
CISA Flags ICS Bugs in Baxter, Mitsubishi Products
The vulnerabilities affect industrial control tech used across the healthcare and critical manufacturing sectors.
‘Revival Hijack’ on PyPI Disguises Malware with Legitimate File Names
Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.
CEO’s Arrest Will Likely Not Dampen Cybercriminal Interest in Telegram
In recent years, the platform has become a go-to tool for executing almost all conceivable cybercriminal activity.
Iran’s ‘Fox Kitten’ Group Aids Ransomware Attacks on US Targets
In a joint advisory, CISA and the FBI described the activity as a likely attempt by the group to monetize access to networks it already has compromised.
BlackByte Targets ESXi Bug With Ransomware to Access Virtual Assets
The pivot is one of several changes the groups using the malware have used in recent attacks.