WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages…

Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation

Microsoft has revealed that it’s pursuing legal action against a “foreign-based threat–actor group” for operating a hacking-as-a-service infrastructure…

SAP Patches Critical Vulnerabilities in NetWeaver

Enterprise software maker SAP on Tuesday announced the release of 14 new security notes as part…

Western Security Agencies Share Advice on Selecting OT Products

The authoring agencies warn that threat actors are targeting particular OT products rather than specific organizations, pointing out…

Compromised AWS Keys Abused in Codefinger Ransomware Attacks

A threat actor has been observed abusing compromised AWS keys to encrypt data in S3 buckets…

CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks

The US cybersecurity agency CISA is urging federal agencies to patch a second vulnerability in BeyondTrust…

Many Ivanti VPNs Still Unpatched as UK Domain Registry Emerges as Victim of Exploitation

A significant number of Ivanti VPNs are still exposed to attacks exploiting a recent vulnerability, and…

Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments

Threat actors are exploiting a critical-severity remote code execution (RCE) vulnerability in Aviatrix Controller to deploy…

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials

A high-severity flaw impacting select Four-Faith industrial routers has come under active exploitation in the wild,…

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

The United States Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has proposed new…