Top Cybersecurity Threats, Tools and Tips

The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad…

Ransomware on ESXi: The Mechanization of Virtualized Attacks

In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand…

Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems

No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked…

WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages…

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials

A high-severity flaw impacting select Four-Faith industrial routers has come under active exploitation in the wild,…

Chinese Hackers Accessed US Treasury Workstations in ‘Major’ Cybersecurity Incident

Chinese hackers remotely accessed US Treasury Department workstations and unclassified documents after compromising a cloud-based service…

Five Things To Know On The ‘Major’ US Treasury Department Hack

New details have emerged on the China-linked breach disclosed by the U.S. Treasury Department earlier this…

LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers

A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol…

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber…

CrowdStrike Seeks Dismissal For Most Of Delta Lawsuit Claims

CrowdStrike petitioned a Georgia court Monday to dismiss nearly all claims in Delta’s lawsuit over the…