"Websites Exposing Over a Million Secrets, Leaving Visitors at Risk"

"Websites Exposing Over a Million Secrets, Leaving Visitors at Risk"

The Cybernews research team found 58,364 unique websites vulnerable to data breaches and full takeovers. Cybernews began investigating publicly exposed environment (.env) files on April 9. These configuration files contain passwords, Application Programming Interface (API) keys, and other secrets websites need to access databases, mail servers, payment processors, Content Management Systems (CMS), and other services. A scan of publicly available indexes shows that thousands of website owners have left their keys unprotected.

Submitted by Gregory Rigby on

"Cornell Tech Launches Security, Trust, and Safety Initiative"

"Cornell Tech Launches Security, Trust, and Safety Initiative"

Cornell Tech's Security, Trust, and Safety (SETS) Initiative will leverage Cornell University's computer security, digital safety, policy, ethics, and law faculty, as well as its partnership with the Technion. SETS will guide new teaching, research, engagement, and entrepreneurial activities to address the global threats of unsafe digital technologies. The initiative will delve into computer security, emerging threats to online safety, and more. This article continues to discuss the SETS Initiative launched by Cornell Tech.

Submitted by Gregory Rigby on

Cyber Scene - Cyber Threats and Counterthreats

Cyber Scene - Cyber Threats and Counterthreats

By krahal

The world seems to twirl faster. We have recently enjoyed a rare solar eclipse and a visit by auroras. Mother Nature has also sent tornados—all within a few weeks. So too does cyber in the tech world, and perhaps even faster. The challenge is embracing and expanding the good and controlling the bad.

Submitted by Gregory Rigby on

"Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha"

"Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha"

A new campaign targets Brazilian banks with "AllaSenha," a custom variant of the Windows-based "AllaKore" Remote Access Trojan (RAT). The malware uses Azure cloud as Command-and-Control (C2) infrastructure, according to the cybersecurity company HarfangLab. The attack begins with a malicious Windows shortcut (LNK) file posing as a PDF document hosted on a WebDAV server. This article continues to discuss findings regarding the new AllaKore RAT variant.

Submitted by Gregory Rigby on

"XSS Vulnerabilities Found in WordPress Plugin Slider Revolution"

"XSS Vulnerabilities Found in WordPress Plugin Slider Revolution"

Security researchers at Patstack conducted a security audit recently of the Slider Revolution plugin and uncovered two significant vulnerabilities that could compromise the security of WordPress websites. Slider Revolution is a widely used premium plugin with over 9 million active users.  It was found to have an unauthenticated stored XSS vulnerability.  This flaw could allow unauthorized users to steal sensitive information and escalate privileges on WordPress sites with a single HTTP request.

Submitted by Adam Ekwall on

"Okta Warns of Credential Stuffing Attacks Targeting Its CORS Feature"

"Okta Warns of Credential Stuffing Attacks Targeting Its CORS Feature"

Okta, a leading Identity and Access Management (IAM) company, warns that since April, credential stuffing attacks have targeted a Customer Identity Cloud (CIC) feature. Credential stuffing attacks involve threat actors creating large lists of usernames and passwords stolen in data breaches or by malware to break into online accounts. Okta found credential stuffing attacks targeting endpoints utilizing CIC's Cross-Origin Resource Sharing (CORS) feature. This article continues to discuss the credential stuffing attacks targeting Okta's CORS feature.

Submitted by Gregory Rigby on
Subscribe to