Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems

No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked…

WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages…

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials

A high-severity flaw impacting select Four-Faith industrial routers has come under active exploitation in the wild,…

Chinese Hackers Accessed US Treasury Workstations in ‘Major’ Cybersecurity Incident

Chinese hackers remotely accessed US Treasury Department workstations and unclassified documents after compromising a cloud-based service…

Five Things To Know On The ‘Major’ US Treasury Department Hack

New details have emerged on the China-linked breach disclosed by the U.S. Treasury Department earlier this…

LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers

A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol…

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber…

CrowdStrike Seeks Dismissal For Most Of Delta Lawsuit Claims

CrowdStrike petitioned a Georgia court Monday to dismiss nearly all claims in Delta’s lawsuit over the…

Arctic Wolf To Acquire Cylance Assets From BlackBerry For $160M

Arctic Wolf said Monday it will enhance its security operations platform with the planned acquisition of…

CISA Seeking Public Comment on Updated National Cyber Incident Response Plan

The US cybersecurity agency CISA has released a draft version of its updated National Cyber Incident…