Their findings highlight the frailty of some of the mechanisms for establishing trust on the Internet.
Автор: Jai Vijayan, Contributing Writer
‘Hadooken’ Malware Targets Oracle’s WebLogic Servers
An attacker is using the tool to deploy a cryptominer and the Tsunami DDoS bot on compromised systems.
Microsoft Discloses 4 Zero-Days in September Update
This month’s Patch Tuesday contains a total of 79 vulnerabilities — the fourth largest of the year.
Akira Ransomware Actors Exploit SonicWall Bug for RCE
CISA has added CE-2024-40766 to its Known Exploited Vulnerabilities catalog.
CISA Flags ICS Bugs in Baxter, Mitsubishi Products
The vulnerabilities affect industrial control tech used across the healthcare and critical manufacturing sectors.
‘Revival Hijack’ on PyPI Disguises Malware with Legitimate File Names
Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.
CEO’s Arrest Will Likely Not Dampen Cybercriminal Interest in Telegram
In recent years, the platform has become a go-to tool for executing almost all conceivable cybercriminal activity.
Iran’s ‘Fox Kitten’ Group Aids Ransomware Attacks on US Targets
In a joint advisory, CISA and the FBI described the activity as a likely attempt by the group to monetize access to networks it already has compromised.
BlackByte Targets ESXi Bug With Ransomware to Access Virtual Assets
The pivot is one of several changes the groups using the malware have used in recent attacks.
Hitachi Energy Vulnerabilities Plague SCADA Power Systems
The company has assessed four of the five disclosed vulnerabilities as being of high to critical severity.