The security vulnerabilities could lead to everything from gas spills to operations data disclosure, affecting gas stations, airports, military bases, and other hypersensitive locations.
Автор: Tara Seals, Managing Editor, News, Dark Reading
Critical Automated Tank Gauge Bugs Threaten Critical Infrastructure
The security vulnerabilities could lead to everything from gas spills to operations data disclosure, affecting gas stations, airports, military bases, and other hypersensitive locations.
‘TIDrone’ Cyberattackers Target Taiwan’s Drone Manufacturers
The Chinese-speaking group is launching sophisticated malware towards military and satellite targets globally.
Halliburton Data Stolen in Oil-Sector Cyberattack
The energy kahuna said that operations were disrupted after an attack on its supporting business applications.
RansomHub Rolls Out Brand-New, EDR-Killing BYOVD Binary
After loading a vulnerable driver, the utility uses a public exploit to gain privilege escalation and the ability to disable endpoint protection software.
Rockwell PLC Security Bypass Threatens Manufacturing Processes
A security vulnerability in Rockwell Automation’s ControlLogix 1756 programmable logic controllers, tracked as CVE-2024-6242, could allow tampering with physical processes at plants.
Critical Apache OFBiz Vulnerability Allows Preauth RCE
The enterprise resource planning platform bug CVE-2024-38856 has a vulnerability-severity score of 9.8 out of 10 on the CVSS scale and offers a wide avenue into enterprise applications for cyberattackers.
North Koreans Target Devs Worldwide With Spyware, Job Offers
DEV#POPPER is back, looking to deliver a comprehensive, updated infostealer to coding job seekers by way of a savvy social engineering gambit.
Cyberattackers Accessed HealthEquity Customer Info via Third Party
Data thieves heisted the HSA provider’s data repository for 4.5 million people’s HR information, including employer and dependents intel.
Well-Established Cybercriminal Ecosystem Blooming in Iraq
A malicious Telegram bot is the key to a veritable flourishing garden of nefarious cybercriminal activity, which was discovered via a series of Python packages.