The increasing frequency and severity of software supply chain attacks have sent shockwaves through the cybersecurity…
Author: admin
Top Cybersecurity Threats, Tools and Tips
The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad…
Ransomware on ESXi: The Mechanization of Virtualized Attacks
In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand…
Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems
No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked…
WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages…
Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation
Microsoft has revealed that it’s pursuing legal action against a “foreign-based threat–actor group” for operating a hacking-as-a-service infrastructure…
SAP Patches Critical Vulnerabilities in NetWeaver
Enterprise software maker SAP on Tuesday announced the release of 14 new security notes as part…
Western Security Agencies Share Advice on Selecting OT Products
The authoring agencies warn that threat actors are targeting particular OT products rather than specific organizations, pointing out…
Compromised AWS Keys Abused in Codefinger Ransomware Attacks
A threat actor has been observed abusing compromised AWS keys to encrypt data in S3 buckets…
CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks
The US cybersecurity agency CISA is urging federal agencies to patch a second vulnerability in BeyondTrust…