News
-
"Massive Ad Fraud Campaign Sends Million of Spam Emails from Thousands of Hijacked Reputable Domains"An ad fraud campaign uses thousands of hijacked legitimate domains and subdomains to send millions of spam emails, generating revenue for the threat actors.
-
"Microsoft: Russians Are Using Stolen Information to Breach Company's Systems"Microsoft warns that Russian hackers who launched several high-profile attacks on the US government are now exploiting information stolen from the company's systems in November.
-
"Switzerland: Play Ransomware Leaked 65,000 Government Documents"The National Cyber Security Centre (NCSC) of Switzerland has recently released a report on its analysis of a data breach following a ransomware attack on Xplain, disclosing that the incident impacted thousands of sensitive Federal government files.
-
"CISA Warns on JetBrains TeamCity Flaw That Could Allow Hackers to Generate Admin Accounts"The US Cybersecurity and Infrastructure Security Agency (CISA) has added a JetBrains vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, noting evidence of active exploitation.
-
"Tesla Can Be Hacked via MiTM Phishing Attack"Researchers discovered that hackers can steal a Tesla Model 3 by conducting a Man-in-The-Middle (MiTM) phishing attack on car owners' Tesla accounts.
-
"UnitedHealth Sets Timeline to Restore Change Healthcare Systems After BlackCat Hit"UnitedHealth Group has recently published a timeline to restore Change Healthcare’s systems following the BlackCat/ALPHV ransomware attack, which has led to delays to patient care across the US.
-
"NSA Releases Top Ten Cloud Security Mitigation Strategies"The National Security Agency (NSA) has published "Top Ten Cloud Security Mitigation Strategies" to help cloud customers understand important security practices as they migrate their data to cloud environments.
-
"Scientists Put Forth a Smarter Way to Protect a Smarter Grid"A team of experts at the US Department of Energy's (DOE) Pacific Northwest National Laboratory (PNNL) presented a new approach to protecting the electric grid against cyberattacks.
-
"Flaws in Public Records Management Tool Could Let Hackers Nab Sensitive Data Linked to Requests"According to Jason Parker, an independent cybersecurity researcher, a popular tool used by many state and local governments to manage public records requests had flaws that could have enabled hackers to download unsecured files associated with records
-
"Research Exposes Security, Privacy and Safety Issues in Female Technology Apps Used to Track Fertility, Menopause and Monthly Cycle"A team of researchers identified significant security, privacy, and safety issues with FemTech, which is a collection of digital technologies focusing on women's health and well-being. Such technologies include apps, wearable devices, and software.
-
"Hacked WordPress Sites Abusing Visitors' Browsers for Distributed Brute-Force Attacks"Threat actors are using malicious JavaScript injections to launch brute-force attacks on WordPress sites.
-
"Linux Variants of Bifrost Trojan Evade Detection via Typosquatting"A 20-year-old Remote Access Trojan (RAT) has reemerged with new variants targeting Linux and impersonating a trusted hosted domain.