Translate
Thursday, 31 March 2022
Zyxel Releases Patches for Critical Bug Affecting Business Firewall and VPN Devices
Apple Issues Patches for 2 Actively Exploited Zero-Days in iPhone, iPad and Mac Devices
New Python-based Ransomware Targeting JupyterLab Web Notebooks
Hackers Increasingly Using 'Browser in a Browser' Technique in Ukraine Related Attacks
Wednesday, 30 March 2022
Unpatched Java Spring Framework 0-Day RCE Bug Threatens Enterprise Web Apps Security
QNAP Warns of OpenSSL Infinite Loop Vulnerability Affecting NAS Devices
A mitmproxy Vulnerability Could Allow HTTP Request Smuggling Attacks
A major security vulnerability appeared in the mitmproxy service that allowed an adversary to conduct…
A mitmproxy Vulnerability Could Allow HTTP Request Smuggling Attacks on Latest Hacking News.
The State of Malware Analysis and Responses to Emerging Threats
Cybersecurity breaches have become a persistent threat for organizations in today’s tech-driven world. While companies…
The State of Malware Analysis and Responses to Emerging Threats on Latest Hacking News.
Critical Vulnerability Affecting Western Digital My Cloud OS 5 Devices – Patch Now
Western Digital has recently addressed a critical security vulnerability affecting its My Cloud OS 5…
Critical Vulnerability Affecting Western Digital My Cloud OS 5 Devices – Patch Now on Latest Hacking News.
Improve Your Hacking Skills with 9 Python Courses for Just $39
Women in tech: Unique insights from a lifelong pursuit of innovation
Leading Slovak computer scientist Mária Bieliková shares her experience working as a woman driving technological innovation and reflects on how to inspire the next generation of talent in tech
The post Women in tech: Unique insights from a lifelong pursuit of innovation appeared first on WeLiveSecurity
LAPSUS$ Claims to Have Breached IT Firm Globant; Leaks 70GB of Data
Tuesday, 29 March 2022
CISA Warns of Ongoing Cyber Attacks Targeting Internet-Connected UPS Devices
Critical SonicOS Vulnerability Affects SonicWall Firewall Appliances
Critical Sophos Firewall RCE Vulnerability Under Active Exploitation
New Malware Loader 'Verblecon' Infects Hacked PCs with Cryptocurrency Miners
Experts Detail Virtual Machine Used by Wslink Malware Loader for Obfuscation
A Large-Scale Supply Chain Attack Distributed Over 800 Malicious NPM Packages
New Report on Okta Hack Reveals the Entire Episode LAPSUS$ Attack
Monday, 28 March 2022
Severe XSS Vulnerability Found In Microweber CMS
Researchers found a severe cross-site scripting (XSS) vulnerability in Microweber CMS. Exploiting the bug could…
Severe XSS Vulnerability Found In Microweber CMS on Latest Hacking News.
Hackers Hijack Email Reply Chains on Unpatched Exchange Servers to Spread Malware
Of Cybercriminals and IP Addresses
Trojanized Crypto Wallets Flood Android And iOS App Stores
Heads up, crypto users! A flurry of trojanized crypto wallets mimicking popular services has emerged…
Trojanized Crypto Wallets Flood Android And iOS App Stores on Latest Hacking News.
'Purple Fox' Hackers Spotted Using New Variant of FatalRAT in Recent Malware Attacks
Muhstik Botnet Targeting Redis Servers Using Recently Disclosed Vulnerability
Sunday, 27 March 2022
Latest Google Chrome Update Fixed Another Zero-Day Flaw
Heads up Chrome users! Google has just pushed another update to its Chrome browser, once…
Latest Google Chrome Update Fixed Another Zero-Day Flaw on Latest Hacking News.
Saturday, 26 March 2022
Azurite – An Azure AD Enumeration Tool
What is Azurite? This one’s a doozy folks. With the rapid growth of cloud infrastructure…
Azurite – An Azure AD Enumeration Tool on Latest Hacking News.
FCC Adds Kaspersky and Chinese Telecom Firms to National Security Threat List
Another Chinese Hacking Group Spotted Targeting Ukraine Amid Russia Invasion
Week in security with Tony Anscombe
ESET discovers Mustang Panda's Hodur trojan – Crypto malware targeting Android and iOS users alike – Nation-state digital deterrent
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Friday, 25 March 2022
Google Issues Urgent Chrome Update to Patch Actively Exploited Zero-Day Vulnerability
Week in security with Tony Anscombe
ESET discovers Mustang Panda's Hodur trojan – Crypto malware targeting Android and iOS users alike – Nation-state digital deterrent
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
U.S. Charges 4 Russian Govt. Employees Over Hacking Critical Infrastructure Worldwide
7 Suspected Members of LAPSUS$ Hacker Gang, Aged 16 to 21, Arrested in U.K.
Experts Uncover Campaign Stealing Cryptocurrency from Android and iPhone Users
North Korean Hackers Exploited Chrome Zero-Day to Target Fintech, IT, and Media Firms
Thursday, 24 March 2022
Is a nation‑state digital deterrent scenario so far‑fetched?
Why has the conflict in Ukraine not caused the much anticipated global cyber-meltdown?
The post Is a nation‑state digital deterrent scenario so far‑fetched? appeared first on WeLiveSecurity
Crypto malware in patched wallets targeting Android and iOS devices
ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets
The post Crypto malware in patched wallets targeting Android and iOS devices appeared first on WeLiveSecurity
Chinese APT Hackers Targeting Betting Companies in Southeast Asia
How to Build a Custom Malware Analysis Sandbox
Be Aware of What is Out There in Cybersecurity Threats and Protection 2022
Cybersecurity threats are real. Every minute of every day, cybercriminals are hatching up elaborate plans…
Be Aware of What is Out There in Cybersecurity Threats and Protection 2022 on Latest Hacking News.
Researchers Trace LAPSUS$ Cyber Attacks to 16-Year-Old Hacker from England
Over 200 Malicious NPM Packages Caught Targeting Azure Developers
Wednesday, 23 March 2022
Mustang Panda’s Hodur: Old tricks, new Korplug variant
ESET researchers have discovered Hodur, a previously undocumented Korplug variant spread by Mustang Panda, that uses phishing lures referencing current events in Europe, including the invasion of Ukraine
The post Mustang Panda’s Hodur: Old tricks, new Korplug variant appeared first on WeLiveSecurity
VMware Issues Patches for Critical Flaws Affecting Carbon Black App Control
New Variant of Chinese Gimmick Malware Targeting macOS Users
Use This Definitive RFP Template to Effectively Evaluate XDR solutions
Over 200,000 MicroTik Routers Worldwide Are Under the Control of Botnet Malware
Most Important Facts You Need To Know About Cyber Security in the Cloud
Cyber Security is not just about protecting your network. It’s also about securing your data…
Most Important Facts You Need To Know About Cyber Security in the Cloud on Latest Hacking News.
Tuesday, 22 March 2022
Microsoft and Okta Confirm Breach by LAPSUS$ Extortion Group
How To Do Preemptive Cybersecurity
Preventing cybersecurity threats should be a top priority for any organization, large or small. By…
How To Do Preemptive Cybersecurity on Latest Hacking News.
Browser-in-The-Browser Attack – A New Phishing Strategy
A security researcher has devised a new browser exploitation technique that can trigger phishing attacks.…
Browser-in-The-Browser Attack – A New Phishing Strategy on Latest Hacking News.
LAPSUS$ Hackers Claim to Have Breached Microsoft and Authentication Firm Okta
Wazuh Offers XDR Functionality at a Price Enterprises Will Love — Free!
U.S. Government Warns Companies of Potential Russian Cyberattacks
New Dell BIOS Bugs Affect Millions of Inspiron, Vostro, XPS, Alienware Systems
Sandworm: A tale of disruption told anew
As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again
The post Sandworm: A tale of disruption told anew appeared first on WeLiveSecurity
Monday, 21 March 2022
In Cyber Warfare, Everyone Worldwide Can Become Collateral Damage
As Russia attacked Ukraine, global leaders have been very careful in making statements that could…
In Cyber Warfare, Everyone Worldwide Can Become Collateral Damage on Latest Hacking News.
Researchers Find CryptoRom Scam Active Via Sideloaded Apps
After targeting mobile users for about a year, the CryptoRom scam is again active in…
Researchers Find CryptoRom Scam Active Via Sideloaded Apps on Latest Hacking News.
VPN For Streaming – Do You Need One?
It’s safe to say that streaming services like Netflix and HBO Go have changed the…
VPN For Streaming – Do You Need One? on Latest Hacking News.
New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable
New Backdoor Targets French Entities via Open-Source Package Installer
'CryptoRom' Crypto Scam Abusing iPhone Features to Target Mobile Users
South Korean DarkHotel Hackers Targeted Luxury Hotels in Macau
Friday, 18 March 2022
Week in security with Tony Anscombe
ESET Research finds another data wiper in Ukraine – Securing data centers against threats – A cultural divide between the military and Silicon Valley
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Defending the data center: The time to act is now
Cyberattacks against data centers may ultimately be everyone's problem – how prepared are their operators for the heightened risk of cyber-assaults?
The post Defending the data center: The time to act is now appeared first on WeLiveSecurity
Hackers Target Bank Networks with new Rootkit to Steal Money from ATM Machines
Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware
Google Uncovers 'Initial Access Broker' Working with Conti Ransomware Gang
Thursday, 17 March 2022
New Variant of Russian Cyclops Blink Botnet Targeting ASUS Routers
The Golden Hour of Incident Response
Critical Remote Code Execution Vulnerability Found In Parse Server
Researchers have discoverd a critical-severity bug in the opensource tool Parse Server. Exploiting this server…
Critical Remote Code Execution Vulnerability Found In Parse Server on Latest Hacking News.
TrickBot Malware Abusing Hacked IoT Devices as Command-and-Control Servers
Hacking Robots: The Future of Production Poses a Security Risk
The goal of every organization is to find easy and more efficient ways of doing…
Hacking Robots: The Future of Production Poses a Security Risk on Latest Hacking News.
Ukraine Secret Service Arrests Hacker Helping Russian Invaders
New Vulnerability in CRI-O Engine Lets Attackers Escape Kubernetes Containers
Wednesday, 16 March 2022
US military vs. Silicon Valley – a cultural divide
The US military knows it needs to speed up technology adoption through optimization, something at the heart of Silicon Valley culture
The post US military vs. Silicon Valley – a cultural divide appeared first on WeLiveSecurity
Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters
Hackers Spread BazarBackdoor Malware Via Website Contact Forms
Once again, the BazarBackdoor malware is running active campaigns in the wild, running campaigns behind…
Hackers Spread BazarBackdoor Malware Via Website Contact Forms on Latest Hacking News.
German Government Warns Against Using Russia's Kaspersky Antivirus Software
Build Your 2022 Cybersecurity Plan With This Free PPT Template
Multiple Flaws Uncovered in ClickHouse OLAP Database System for Big Data
Tuesday, 15 March 2022
Facebook Hit With $18.6 Million GDPR Fine Over 12 Data Breaches in 2018
How Does Blockchain Impact the Financial Industry?
Increasing productivity while also reducing dependency on centralized systems is basically what blockchain is all…
How Does Blockchain Impact the Financial Industry? on Latest Hacking News.
Importance Of Data Protection In 2022
Today’s corporate environment is entirely data-driven, where businesses rely on bits and pieces of information…
Importance Of Data Protection In 2022 on Latest Hacking News.
CaddyWiper: Yet Another Data Wiping Malware Targeting Ukrainian Networks
Massive DDoS Attack Knocked Israeli Government Websites Offline
Monday, 14 March 2022
'Dirty Pipe' Linux Flaw Affects a Wide Range of QNAP NAS Devices
CaddyWiper: New wiper malware discovered in Ukraine
This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian organizations
The post CaddyWiper: New wiper malware discovered in Ukraine appeared first on WeLiveSecurity
A first look at threat intelligence and threat hunting tools
An overview of some of the most popular open-source tools for threat intelligence and threat hunting
The post A first look at threat intelligence and threat hunting tools appeared first on WeLiveSecurity
3 Ways the Cybercriminals Getcha & How to Be Prepared
On the internet, there are so many things that can go wrong. So much of…
3 Ways the Cybercriminals Getcha & How to Be Prepared on Latest Hacking News.
Russian Ransomware Gang Retool Custom Hacking Tools of Other APT Groups
UK Ferry Service Wightlink Admitted Data Breach
UK’s ferry service operator Wightlink has recently admitted a data breach following a cyberattack. While…
UK Ferry Service Wightlink Admitted Data Breach on Latest Hacking News.
New Linux Bug in Netfilter Firewall Module Lets Attackers Gain Root Access
SSL Certificates and PKI Management For Better Your Web Security
Size doesn’t matter when it comes to cyber attacks. Big or small, thousands of websites…
SSL Certificates and PKI Management For Better Your Web Security on Latest Hacking News.
Researchers Find New Evidence Linking Kwampirs Malware to Shamoon APT Hackers
Saturday, 12 March 2022
Sparta- A Network Scanning and Enumeration Tool
What Is Sparta? Sparta, created by SECFORCE is the ultimate tool for recon and network…
Sparta- A Network Scanning and Enumeration Tool on Latest Hacking News.
Legion By GoVanguard- An Automated Reconnaissance Tool
What is Legion Legion is a semi-automated easy to use network penetration testing framework that…
Legion By GoVanguard- An Automated Reconnaissance Tool on Latest Hacking News.
Friday, 11 March 2022
Week in security with Tony Anscombe
Gray zone conflicts in cyberspace – Can you identify fake news? – Top cybersecurity threats for the healthcare sector
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
ESET Research webinar: How APT groups have turned Ukraine into a cyber‑battlefield
Ukraine has been under cyber-fire for years now – here’s what you should know about various disruptive cyberattacks that have hit the country since 2014
The post ESET Research webinar: How APT groups have turned Ukraine into a cyber‑battlefield appeared first on WeLiveSecurity
1Password Raise Bug Bounty Rewards To $1 Million
The popular password management solution 1Password has announced expanding its highest bounty reward limits. Onwards,…
1Password Raise Bug Bounty Rewards To $1 Million on Latest Hacking News.
Russian Pushing New State-run TLS Certificate Authority to Deal With Sanctions
True or false? How to spot – and stop – fake news
How can you tell fact from fiction and avoid falling for and spreading falsehoods about the war in Ukraine?
The post True or false? How to spot – and stop – fake news appeared first on WeLiveSecurity
Here's How to Find if WhatsApp Web Code on Your Browser Has Been Hacked
Thursday, 10 March 2022
SharkBot Android Trojan Mimics Legit Apps To Appear On Google Play Store
Heads up, Android users! Another banking malware has attempted to target Android users by impersonating…
SharkBot Android Trojan Mimics Legit Apps To Appear On Google Play Store on Latest Hacking News.
Surfshark Review: A Robust Online Privacy Solution On Budget
Having a VPN today is a must-have for all internet users. But getting one without…
Surfshark Review: A Robust Online Privacy Solution On Budget on Latest Hacking News.
Iranian Hackers Targeting Turkey and Arabian Peninsula in New Malware Campaign
SQL Injection Vulnerability Discovered in Moodle
A researcher has recently explained how a vulnerability in the Moodle platform could allow for…
SQL Injection Vulnerability Discovered in Moodle on Latest Hacking News.
New Exploit Bypasses Existing Spectre-v2 Mitigations in Intel, AMD, Arm CPUs
Ukrainian Hacker Linked to REvil Ransomware Attacks Extradited to United States
Wednesday, 9 March 2022
Emotet Botnet's Latest Resurgence Spreads to Over 100,000 Computers
The Incident Response Plan - Preparing for a Rainy Day
Linux Dirty Pipe Exploit Gives Root Access – Patch Now
Newly discovered vulnerability “Dirty Pipe” vulnerability most Linux distros, giving root access to the attacker…
Linux Dirty Pipe Exploit Gives Root Access – Patch Now on Latest Hacking News.
Chinese APT41 Hackers Broke into at Least 6 U.S. State Governments: Mandiant
Critical RCE Bugs Found in Pascom Cloud Phone System Used by Businesses
Tuesday, 8 March 2022
Critical Security Patches Issued by Microsoft, Adobe and Other Major Software Firms
New 16 High-Severity UEFI Firmware Flaws Discovered in Millions of HP Devices
Critical "Access:7" Supply Chain Vulnerabilities Impact ATMs, Medical and IoT Devices
The Continuing Threat of Unpatched Security Vulnerabilities
Researchers Warn of Linux Kernel ‘Dirty Pipe’ Arbitrary File Overwrite Vulnerability
Monday, 7 March 2022
Microsoft Azure 'AutoWarp' Bug Could Have Let Attackers Access Customers' Accounts
Cyber‑readiness in the face of an escalated gray zone conflict
Organizations worldwide should remain on high alert for cyberattacks as the risk of major cyber-spillover from the crisis in Ukraine continues to loom large
The post Cyber‑readiness in the face of an escalated gray zone conflict appeared first on WeLiveSecurity
Tech Advancements That are Boosting Cybersecurity
Technology is constantly evolving. The latest tech could hit the market with flaws all over…
Tech Advancements That are Boosting Cybersecurity on Latest Hacking News.
Understanding How Hackers Recon
Ukrainian CERT Warns Citizens of Phishing Attacks Using Compromised Accounts
After NVIDIA, Samsung Are The Next Victims Of Data Theft
Samsung emerges as the latest victim of data theft. Reportedly, the same attackers who targeted…
After NVIDIA, Samsung Are The Next Victims Of Data Theft on Latest Hacking News.
Sunday, 6 March 2022
SharkBot Banking Malware Spreading via Fake Android Antivirus App on Google Play Store
2 New Mozilla Firefox 0-Day Bugs Under Active Attack — Patch Your Browser ASAP!
Chrome Skype Extension Flaw Threatened User Privacy
A serious security flaw in Microsoft’s Skype extension for Chrome browser risked users’ privacy. Thankfully,…
Chrome Skype Extension Flaw Threatened User Privacy on Latest Hacking News.
Saturday, 5 March 2022
New Linux Kernel Cgroups Vulnerability Could Let Attackers Escape Container
Imperva Thwarts 2.5 Million RPS Ransom DDoS Extortion Attacks
Friday, 4 March 2022
CISA Adds Another 95 Flaws to its Actively Exploited Vulnerabilities Catalog
Week in security with Tony Anscombe
New malware targeting organizations in Ukraine – How organizations can improve their cyber-resiliency – Scammers taking advantage of the crisis
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Emergency preparedness: How to disaster‑proof your tech
Here are a few tips that will help you get your ‘go bag’ ready if you have to leave at a moment’s notice and need your communications and data to survive
The post Emergency preparedness: How to disaster‑proof your tech appeared first on WeLiveSecurity
Both Sides in Russia-Ukraine War Heavily Using Telegram for Disinformation and Hacktivism
Thursday, 3 March 2022
ESET Research Podcast: Ukraine’s past and present cyberwar
Press play to hear Aryeh Goretsky, Jean-Ian Boutin and Robert Lipovsky discuss how recent malware attacks in Ukraine tie into years of cyberattacks against the country
The post ESET Research Podcast: Ukraine’s past and present cyberwar appeared first on WeLiveSecurity
Critical Patches Issued for Cisco Expressway Series, TelePresence VCS Products
How to Automate Offboarding to Keep Your Company Safe
Cybercrime Lurks During Tax Season with New Rules Around Cryptocurrency
Grayson Milbourne, Security Intelligence Director at Webroot, an OpenText company With less than two months…
Cybercrime Lurks During Tax Season with New Rules Around Cryptocurrency on Latest Hacking News.
Hacking iOS vs Android: Which Generates Most Interest?
One of the world’s leading two-factor authentication firms has used search data to reveal which…
Hacking iOS vs Android: Which Generates Most Interest? on Latest Hacking News.
Hackers Who Broke Into NVIDIA's Network Leak DLSS Source Code Online
Report: Nearly 75% of Infusion Pumps Affected by Severe Vulnerabilities
U.S. Senate Passes Cybersecurity Bill to Strengthen Critical Infrastructure Security
Wednesday, 2 March 2022
An in-Depth Guide to Lateral Movement in Cybersecurity
The number of avenues for cyberattacks seems endless, especially during the digital era we’re experiencing…
An in-Depth Guide to Lateral Movement in Cybersecurity on Latest Hacking News.
Innovation and the Roots of Progress
If you look back at the long arc of history, it’s clear that one of the most crucial drivers of real progress in society is innovation
The post Innovation and the Roots of Progress appeared first on WeLiveSecurity
LIVE Webinar: Key Lessons Learned from Major Cyberattacks in 2021 and What to Expect in 2022
Tuesday, 1 March 2022
Critical Bugs Reported in Popular Open Source PJSIP SIP and Media Stack
Critical Security Bugs Uncovered in VoIPmonitor Monitoring Software
TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps
Bridgestone Americas At A Standstill After Facing Cyberattack
The automotive giant Bridgestone Americas Inc. has recently suffered a cyberattack on its systems. Following…
Bridgestone Americas At A Standstill After Facing Cyberattack on Latest Hacking News.
Trickbot Malware Gang Upgrades its AnchorDNS Backdoor to AnchorMail
IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine
ESET researchers uncover a new wiper that attacks Ukrainian organizations and a worm component that spreads HermeticWiper in local networks
The post IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine appeared first on WeLiveSecurity
Why You Should Never Use a Free Proxy Server?
Some websites can limit their content from audiences in certain geolocations. To overtake the blockage,…
Why You Should Never Use a Free Proxy Server? on Latest Hacking News.
Mip22- A Phishing Tool for Linux and Android
What is Mip22? Mip22 is a modern and advanced cyber security program for use with…
Mip22- A Phishing Tool for Linux and Android on Latest Hacking News.