The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad…
Category: Prime
Ransomware on ESXi: The Mechanization of Virtualized Attacks
In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand…
Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems
No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked…
WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages…
15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials
A high-severity flaw impacting select Four-Faith industrial routers has come under active exploitation in the wild,…
Chinese Hackers Accessed US Treasury Workstations in ‘Major’ Cybersecurity Incident
Chinese hackers remotely accessed US Treasury Department workstations and unclassified documents after compromising a cloud-based service…
Five Things To Know On The ‘Major’ US Treasury Department Hack
New details have emerged on the China-linked breach disclosed by the U.S. Treasury Department earlier this…
LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers
A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol…
New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP
Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber…
CrowdStrike Seeks Dismissal For Most Of Delta Lawsuit Claims
CrowdStrike petitioned a Georgia court Monday to dismiss nearly all claims in Delta’s lawsuit over the…