Translate
Monday, 28 February 2022
CISA adds recently disclosed Zimbra bug to its Exploited Vulnerabilities Catalog
CISA Warns of High-Severity Flaws in Schneider and GE Digital's SCADA Software
Reborn of Emotet: New Features of the Botnet and How to Detect it
Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking Measures
Sunday, 27 February 2022
Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API
Beware of charity scams exploiting war in Ukraine
Looking to help people in Ukraine? Donate wisely – do your research first so you give without getting scammed
The post Beware of charity scams exploiting war in Ukraine appeared first on WeLiveSecurity
SockDetour Found As A Backup Backdoor In TiltedTemple APT Campaign
Researchers have found a new tactic from threat actors to ensure continued access to compromised…
SockDetour Found As A Backup Backdoor In TiltedTemple APT Campaign on Latest Hacking News.
Microsoft Defender For Cloud Now Supports Google Cloud
Microsoft has recently announced support for securing Google Cloud Projects with its Defender for Cloud.…
Microsoft Defender For Cloud Now Supports Google Cloud on Latest Hacking News.
Saturday, 26 February 2022
Horde Webmail XSS Vulnerability Allows for Account Takeover
A severe vulnerability riddled the free browser-based groupware Horde Webmail allowing account takeovers. Despite the…
Horde Webmail XSS Vulnerability Allows for Account Takeover on Latest Hacking News.
Xenomorph Banking Trojan Garnered 50K Downloads On Play Store
A new banking malware targeted thousands of Android users after appearing on the Google Play…
Xenomorph Banking Trojan Garnered 50K Downloads On Play Store on Latest Hacking News.
Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store
Friday, 25 February 2022
Russia-Ukraine War: Phishing, Malware and Hacker Groups Taking Sides
Week in security with Tony Anscombe
HermeticWiper takes aim at Ukraine – The climate solutions we need to transform society – Preventing kids from getting involved in cybercrime
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
The past is present: Riffing on a cybersecurityappropriate tune for Black History Month
What can social movements of the past teach you about the future – and about protecting your digital self?
The post The past is present: Riffing on a cybersecurityappropriate tune for Black History Month appeared first on WeLiveSecurity
Thursday, 24 February 2022
Notorious TrickBot Malware Gang Shuts Down its Botnet Infrastructure
New Flaws Discovered in Cisco's Network Operating System for Switches
HermeticWiper: New data‑wiping malware hits Ukraine
Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites
The post HermeticWiper: New data‑wiping malware hits Ukraine appeared first on WeLiveSecurity
Extensis Portfolio Vulnerability Could Allow Remote Code Execution
Researchers have recently disclosed details about multiple security vulnerabilities in Extensis Portfolio software. These include…
Extensis Portfolio Vulnerability Could Allow Remote Code Execution on Latest Hacking News.
Everything You Need to Know About API Security in 2022
Application Programming Interfaces (APIs) are the core of today’s online world. From mobile applications to…
Everything You Need to Know About API Security in 2022 on Latest Hacking News.
US, UK Agencies Warn of New Russian Botnet Built from Hacked Firewall Devices
Wednesday, 23 February 2022
New Wiper Malware Targeting Ukraine Amid Russia's Military Operation
Technology, Progress, and Climate
The climate solutions we need to transform every sector are here. The question is: what role will you play in this transformation? You, your community, your business, your government?
The post Technology, Progress, and Climate appeared first on WeLiveSecurity
The 7 critical backup strategy best practices to keep data safe
Globally hacking attempts are rising all over the world with governments having to issue notices…
The 7 critical backup strategy best practices to keep data safe on Latest Hacking News.
The Impact of Cybersecurity Fraud on Different Sectors
In the past few years, we have seen a dramatic increase in cybersecurity fraud and…
The Impact of Cybersecurity Fraud on Different Sectors on Latest Hacking News.
Multiple Vulnerabilities Found In Zabbix IT Monitoring Platform
Researchers have warned users of numerous security vulnerabilities in the Zabbix monitoring platform. Exploiting the…
Multiple Vulnerabilities Found In Zabbix IT Monitoring Platform on Latest Hacking News.
The Best Practices of Security Testing
As of early 2022, there’s one fact that cannot be stressed enough – we live…
The Best Practices of Security Testing on Latest Hacking News.
Tuesday, 22 February 2022
25 Malicious JavaScript Libraries Distributed via Official NPM Package Repository
Teenage cybercrime: How to stop kids from taking the wrong path
It’s never too late to prevent children from being dragged to the dark side and to ensure their skills are a force for good
The post Teenage cybercrime: How to stop kids from taking the wrong path appeared first on WeLiveSecurity
Microsoft Rolled Out “Enhanced Security” Features With Edge 98
After announcing the “Super Duper Secure Mode” last year, the Redmond giant has now further…
Microsoft Rolled Out “Enhanced Security” Features With Edge 98 on Latest Hacking News.
Hackers Steal $1.7 Million Worth of NFTs from Customers of OpenSea Marketplace
VPN for Streaming – Do You Need One?
When it comes to streaming, it is often suggested that you should use a VPN.…
VPN for Streaming – Do You Need One? on Latest Hacking News.
Chinese Hackers Target Taiwan's Financial Trading Sector with Supply Chain Attack
Monday, 21 February 2022
Hackers Backdoor Unpatched Microsoft SQL Database Servers with Cobalt Strike
Integer overflow: How does it occur and how can it be prevented?
Make no mistake, counting on a computer is not as easy as it may seem. Here’s what happens when a number gets “too big”.
The post Integer overflow: How does it occur and how can it be prevented? appeared first on WeLiveSecurity
A Free Solution to Protect Your Business from 6 Biggest Cyber Threats in 2022
Vulnerability In UpdraftPlus WordPress Plugin Could Expose Backups
A severe vulnerability in the UpdraftPlus WordPress plugin could expose backups to subscribers. Thankfully, the…
Vulnerability In UpdraftPlus WordPress Plugin Could Expose Backups on Latest Hacking News.
Virtualization in Cloud Computing: Features and Benefits
The concept of virtualization took the IT industry by storm. Understanding virtualization in cloud computing…
Virtualization in Cloud Computing: Features and Benefits on Latest Hacking News.
Hackers Exploiting Infected Android Devices to Register Disposable Accounts
Sunday, 20 February 2022
New Unredacter Tool Extracts Text From Pixelized Images
Researchers have again proved why pixelation of images can be a bad idea to hide…
New Unredacter Tool Extracts Text From Pixelized Images on Latest Hacking News.
Squirrelwaffle Malware Loader Exploits Vulnerable Microsoft Exchange Servers
Researchers have found a new malware campaign exploiting vulnerable Microsoft Exchange Servers. The threat actors…
Squirrelwaffle Malware Loader Exploits Vulnerable Microsoft Exchange Servers on Latest Hacking News.
Brakeman – A Code Security Auditing Tool for Ruby
What is a Brakeman? in the 1800s a brakeman was a rail worker responsible for…
Brakeman – A Code Security Auditing Tool for Ruby on Latest Hacking News.
Saturday, 19 February 2022
Master Key for Hive Ransomware Retrieved Using a Flaw in its Encryption Algorithm
Justice Department Appoints First Director of National Cryptocurrency Enforcement Team
Friday, 18 February 2022
U.S. Cybersecurity Agency Publishes List of Free Security Tools and Services
Critical Flaw Uncovered in WordPress Backup Plugin Used by Over 3 Million Sites
Week in security with Tony Anscombe
What does progress in technology mean? – IRS makes a U-turn on facial recognition but questions remain – What retailers need to know about cyberthreats
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
5 Fail-Safe Ways to Back Up Your Data
When things go wrong, you need a dependable backup to save the day. There are…
5 Fail-Safe Ways to Back Up Your Data on Latest Hacking News.
New Linux Privilege Escalation Flaw Uncovered in Snap Package Manager
Thursday, 17 February 2022
Iranian Hackers Targeting VMware Horizon Log4j Flaws to Deploy Ransomware
4 Cloud Data Security Best Practices All Businesses Should Follow Today
Attackers Can Crash Cisco Email Security Appliances by Sending Malicious Emails
Another Critical RCE Discovered in Adobe Commerce and Magento Platforms
Google Bringing Privacy Sandbox to Android to Limit Sharing of User Data
Getting Your SOC 2 Compliance as a SaaS Company
This New Tool Can Retrieve Pixelated Text from Redacted Documents
Researchers Warn of a New Golang-based Botnet Under Continuous Development
Wednesday, 16 February 2022
Moses Staff Hackers Targeting Israeli Organizations for Cyber Espionage
U.S. Says Russian Hackers Stealing Sensitive Data from Defense Contractors
Folding the impossible into the reality of normal life
Progress is a driving force of humanity, but what does that word “progress” really mean and what part do we have to play?
The post Folding the impossible into the reality of normal life appeared first on WeLiveSecurity
Best Tech Jobs In the UK
The tech and IT industry in the UK are currently booming, with some of the…
Best Tech Jobs In the UK on Latest Hacking News.
8 Ways to Secure Your Home Wi-Fi Network
With increases in data breaches and online theft, it has become more important than ever…
8 Ways to Secure Your Home Wi-Fi Network on Latest Hacking News.
EU Data Protection Watchdog Calls for Ban on Pegasus-like Commercial Spyware
Tuesday, 15 February 2022
High-Severity RCE Security Bug Reported in Apache Cassandra Database Software
Facebook Agrees to Pay $90 Million to Settle Decade-Old Privacy Violation Case
Questions linger after IRS’s about‑face on facial recognition
Why would a tax agency contractor’s privacy policy mention collecting information about my Facebook friends?
The post Questions linger after IRS’s about‑face on facial recognition appeared first on WeLiveSecurity
Log4j Vulnerabilities: What Are They, and Are You at Risk?
More businesses are concerned about their cybersecurity. It shouldn’t come as a surprise, considering the…
Log4j Vulnerabilities: What Are They, and Are You at Risk? on Latest Hacking News.
SecLists – A Pentester’s BFF
SecLists is a pentesting tool used by security professionals around the globe, it contains various…
SecLists – A Pentester’s BFF on Latest Hacking News.
Latest Kali Linux 2022.1 Version Arrives With “Everything” Flavor And More
Heads up, Kali users! The latest version of Kali Linux has just arrived with lots…
Latest Kali Linux 2022.1 Version Arrives With “Everything” Flavor And More on Latest Hacking News.
Experts Warn of Hacking Group Targeting Aviation and Defense Sectors
New MyloBot Malware Variant Sends Sextortion Emails Demanding $2,732 in Bitcoin
Monday, 14 February 2022
New Chrome 0-Day Bug Under Active Attack – Update Your Browser ASAP!
From the back office to the till: Cybersecurity challenges facing global retailers
How well retailers can manage the surge in cyberthreats may be crucial for their prospects in a post‑pandemic world
The post From the back office to the till: Cybersecurity challenges facing global retailers appeared first on WeLiveSecurity
Zero-Day Bugs Spotted In Nooie Baby Monitors
Researchers have found numerous bugs affecting Nooie baby monitors. Exploiting the zero-day bugs allows an…
Zero-Day Bugs Spotted In Nooie Baby Monitors on Latest Hacking News.
Adobe Warns Users Of A Critical Magento Zero-Day Vulnerability Under Attack
Adobe has just fixed a critical zero-day bug in the Magento platform, alerting users to…
Adobe Warns Users Of A Critical Magento Zero-Day Vulnerability Under Attack on Latest Hacking News.
Apple Patched A Zero-Day Under Attack With iOS 15.3.1
Weeks after releasing the major iOS update 15.3, Apple has released another update. It turns…
Apple Patched A Zero-Day Under Attack With iOS 15.3.1 on Latest Hacking News.
Spanish Police Arrest SIM Swappers Who Stole Money from Victims Bank Accounts
Critical Security Flaws Reported in Moxa MXview Network Management Software
Sunday, 13 February 2022
Critical Magento 0-Day Vulnerability Under Active Exploitation — Patch Released
Critical Code Execution Bugs Found In PHP Everywhere WordPress Plugin
Researchers discovered a number of severe security bugs leading to code execution in the WordPress…
Critical Code Execution Bugs Found In PHP Everywhere WordPress Plugin on Latest Hacking News.
Saturday, 12 February 2022
Signal App Launches Change Number Feature While Retaining Old Data
Continuing their steps towards a better customer experience, the Signal app now brings the “change…
Signal App Launches Change Number Feature While Retaining Old Data on Latest Hacking News.
Friday, 11 February 2022
Week in security with Tony Anscombe
New ESET Threat Report is out – How dark web services are moving to common apps and services – Leave romance scammers high and dry
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
When love hurts: Watch out for romance scams this Valentine’s Day
Don’t be the next victim – spot the signs of a faux romance in time and send that scammer ‘packing’
The post When love hurts: Watch out for romance scams this Valentine’s Day appeared first on WeLiveSecurity
How Does a WAF detect and respond to attacks?
Nowadays a web application firewall should be an essential part of every business’s infrastructure. This…
How Does a WAF detect and respond to attacks? on Latest Hacking News.
Thursday, 10 February 2022
France Rules That Using Google Analytics Violates GDPR Data Protection Law
Hidden in plain sight: How the dark web is spilling onto social media
A trip into the dark corners of Telegram, which has become a magnet for criminals peddling everything from illegal drugs to fake money and COVID-19 vaccine passes
The post Hidden in plain sight: How the dark web is spilling onto social media appeared first on WeLiveSecurity
Malicious QR Codes Flood Twitter To Deliver a Malicious Chrome Extension
A security researcher has discovered an odd malware campaign flooding Twitter. The threat actors have…
Malicious QR Codes Flood Twitter To Deliver a Malicious Chrome Extension on Latest Hacking News.
FritzFrog P2P Botnet Attacking Healthcare, Education and Government Sectors
COVID Does Not Spread to Computers
CISA, FBI, NSA Issue Advisory on Severe Increase in Ransomware Attacks
Wednesday, 9 February 2022
Russia Cracks Down on 4 Dark Web Marketplaces for Stolen Credit Cards
Critical RCE Flaws in 'PHP Everywhere' Plugin Affect Thousands of WordPress Sites
ESET Threat Report T3 2021
A view of the T3 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
The post ESET Threat Report T3 2021 appeared first on WeLiveSecurity
“Merry-Maker” Card Skimmer Scanner Tool Released As Open Source
To contain the rising incidents of web skimming attacks on e-stores, Target has released its…
“Merry-Maker” Card Skimmer Scanner Tool Released As Open Source on Latest Hacking News.
Researchers Found Zimbra Zero-Day XSS Vulnerability Under Attack
Researchers have found active phishing campaigns exploiting a zero-day vulnerability in the Zimbra email platform.…
Researchers Found Zimbra Zero-Day XSS Vulnerability Under Attack on Latest Hacking News.
Microsoft February Patch Tuesday Addresses 51 Bugs Including A Zero-Day
As scheduled, the monthly Patch Tuesday updates from Microsoft have arrived for February containing a…
Microsoft February Patch Tuesday Addresses 51 Bugs Including A Zero-Day on Latest Hacking News.
U.S. Arrests Two and Seizes $3.6 Billion Cryptocurrency Stolen in 2016 Bitfinex Hack
Guide: Alert Overload and Handling for Lean IT Security Teams
Iranian Hackers Using New Marlin Backdoor in 'Out to Sea' Espionage Campaign
Russian APT Hackers Used COVID-19 Lures to Target European Diplomats
Tuesday, 8 February 2022
Microsoft and Other Major Software Firms Release February 2022 Patch Updates
US: Your AI has to explain its decisions
No more turning a blind eye to algorithmic bias and discrimination if US lawmakers get their way
The post US: Your AI has to explain its decisions appeared first on WeLiveSecurity
Palestinian Hackers Use New NimbleMamba Implant in Recent Attacks
Several Malware Families Using Pay-Per-Install Service to Expand Their Targets
'Roaming Mantis' Android Malware Targeting Europeans via Smishing Campaigns
Medusa Android Banking Trojan Spreading Through Flubot's Attacks Network
How Attack Surface Management Preempts Cyberattacks
Monday, 7 February 2022
Microsoft Disables Internet Macros in Office Apps by Default to Block Malware Attacks
Microsoft Temporarily Disables MSIX App Installers to Prevent Malware Abuse
Mind the Password Hack Tool
YES – you read this right. Mind the hack tool, meaning, keep in mind that…
Mind the Password Hack Tool on Latest Hacking News.
Security During Virtual Meetings
Since the Coronavirus pandemic, virtual meetings have become increasingly commonplace. People from all walks of…
Security During Virtual Meetings on Latest Hacking News.
New CapraRAT Android Malware Targets Indian Government and Military Personnel
Hackers Backdoored Systems at China's National Games Just Before Competition
IoT/connected Device Discovery and Security Auditing in Corporate Networks
Sunday, 6 February 2022
Chinese Hackers Target Taiwanese Financial Institutions with a new Stealthy Backdoor
CISA Orders Federal Agencies to Patch Actively Exploited Windows Vulnerability
Popular VPNs NordVPN And Surfshark Announce Merger
Another major cybersecurity acquisition just happened – this time, involving two VPN giants. Specifically, NordVPN…
Popular VPNs NordVPN And Surfshark Announce Merger on Latest Hacking News.
Saturday, 5 February 2022
New Argo CD Bug Could Let Hackers Steal Secret Info from Kubernetes Apps
Friday, 4 February 2022
Microsoft Uncovers New Details of Russian Hacking Campaign Targeting Ukraine
Week in security with Tony Anscombe
What to know before scanning a QR code – Has your phone been hacked? – Watch your back and keep shoulder surfers at bay
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Think before you scan: How fraudsters can exploit QR codes to steal money
QR codes are all the rage and scammers have taken notice. Look out for dangers lurking behind those little black-and-white squares.
The post Think before you scan: How fraudsters can exploit QR codes to steal money appeared first on WeLiveSecurity
Another Israeli Firm, QuaDream, Caught Weaponizing iPhone Bug for Spyware
U.S. Authorities Charge 6 Indian Call Centers Scamming Thousands of Americans
Russian Gamaredon Hackers Targeted 'Western Government Entity' in Ukraine
Cynet Log4Shell Webinar: A Thorough - And Clear - Explanation
Thursday, 3 February 2022
CISA Warns of Critical Vulnerabilities Discovered in Airspan Networks Mimosa
Hackers Exploited 0-Day Vulnerability in Zimbra Email Platform to Spy on Users
Critical Flaws Discovered in Cisco Small Business RV Series Routers
New SEO Poisoning Campaign Distributing Trojanized Versions of Popular Software
How SSPM Simplifies Your SOC2 SaaS Security Posture Audit
New Variant of UpdateAgent Malware Infects Mac Computers with Adware
New Wave of Cyber Attacks Target Palestine with Political Bait and Malware
Wednesday, 2 February 2022
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone
Some fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them
The post Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone appeared first on WeLiveSecurity
New Malware Used by SolarWinds Attackers Went Undetected for Years
Cynet's Keys to Extend Threat Visibility
Tuesday, 1 February 2022
Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors
Hacker Group 'Moses Staff' Using New StrifeWater RAT in Ransomware Attacks
Critical Bug Found in WordPress Plugin for Elementor with Over a Million Installations
Researchers Devise “DrawnApart” – A GPU Fingerprinting Technique
A team of academic researchers has devised a new user tracking strategy. Dubbed “DrawnApart”, this…
Researchers Devise “DrawnApart” – A GPU Fingerprinting Technique on Latest Hacking News.