H  January(103)  February(113)  March(175)  APRIL(74)  MAY(28)  JUNE(198)  July(423)  August(462)  September(389)  October(48)  November()  December()

DATE

NAME

CATEGORY

WEB

31.7.23New P2PInfect Worm Targets Redis Servers with Undocumented Breach MethodsVirusThe Hacker News
31.7.23Patchwork Hackers Target Chinese Research Organizations Using EyeShell BackdoorVirusThe Hacker News
31.7.23Experts link AVRecon bot to the malware proxy service SocksEscortBotNetSecurityaffairs
31.7.23Three flaws in Ninja Forms plugin for WordPress impact 900K sitesVulnerebilitySecurityaffairs
31.7.23Experts warn attackers started exploiting Citrix ShareFile RCE flaw CVE-2023-24489VulnerebilitySecurityaffairs
31.7.23In 2022, more than 40% of zero-day exploits used in the wild were variations of previous issuesExploitSecurityaffairs
31.7.23New flaw in Ivanti Endpoint Manager Mobile actively exploited in the wildVulnerebilitySecurityaffairs
31.7.23Microsoft fixes WSUS servers not pushing Windows 11 22H2 updatesOS

BleepingComputer

31.7.23Google: Android patch gap makes n-days as dangerous as zero-daysAndroidBleepingComputer
31.7.23Microsoft Edge is getting a 'darker' dark mode themeOS

BleepingComputer

31.7.23Israel's largest oil refinery website offline after DDoS attackBigBrothers

BleepingComputer

31.7.23AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy ServiceBotNetThe Hacker News
31.7.23Fruity Trojan Uses Deceptive Software Installers to Spread Remcos RATVirusThe Hacker News
31.7.23Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites VulnerableVulnerebilityThe Hacker News
30.7.23CISA warns about SUBMARINE Backdoor employed in Barracuda ESG attacksVirusSecurityaffairs
30.7.23Now Abyss Locker also targets VMware ESXi serversVulnerebilitySecurityaffairs
30.7.23Russian APT BlueBravo targets diplomatic entities with GraphicalProton backdoorAPTSecurityaffairs
30.7.23CoinsPaid blames North Korea-linked APT Lazarus for theft of $37M worth of cryptocurrencyAPTSecurityaffairs
30.7.23Monitor Insider Threats but Build Trust FirstSecuritySecurityaffairs
30.7.23Anomaly detection in certificate-based TGT requestsSecuritySecurelist
30.7.23Linux version of Abyss Locker ransomware targets VMware ESXi serversRansom

BleepingComputer

30.7.23Browser developers push back on Google's “web DRM” WEI APISecurityBleepingComputer
30.7.23Apple rejects new name 'X' for Twitter iOS app because... rulesApple

BleepingComputer

30.7.23CISA: New Submarine malware found on hacked Barracuda ESG appliancesVirus

BleepingComputer

30.7.23Apple says new App Store API rules will limit user fingerprintingApple

BleepingComputer

30.7.23The Week in Ransomware - July 28th 2023 - New extortion tacticsRansomBleepingComputer
30.7.23Ivanti patches new zero-day exploited in Norwegian govt attacksVulnerebility

BleepingComputer

30.7.23Twitter's rebranding to 'X' triggers Microsoft Edge security alertSocial

BleepingComputer

30.7.23CISA warns of breach risks from IDOR web app vulnerabilitiesBigBrothers

BleepingComputer

30.7.23New Android malware uses OCR to steal credentials from imagesAndroidBleepingComputer
30.7.23Hawai'i Community College pays ransomware gang to prevent data leakRansom

BleepingComputer

29.7.23New Android Malware CherryBlos Utilizing OCR to Steal Sensitive DataAndroidThe Hacker News
29.7.23Apple Sets New Rules for Developers to Prevent Fingerprinting and Data MisuseAppleThe Hacker News
29.7.23Hackers Deploy "SUBMARINE" Backdoor in Barracuda Email Security Gateway AttacksVirusThe Hacker News
29.7.23Ivanti Warns of Another Endpoint Manager Mobile Vulnerability Under Active AttackVulnerebilityThe Hacker News
29.7.23IcedID Malware Adapts and Expands Threat with Updated BackConnect ModuleVirusThe Hacker News
28.7.23STARK#MULE Targets Koreans with U.S. Military-themed Document LuresBigBrothersThe Hacker News
28.7.23A Data Exfiltration Attack Scenario: The Porsche ExperienceIncindentThe Hacker News
28.7.23Hackers Abusing Windows Search Feature to Install Remote Access TrojansVirusThe Hacker News
28.7.23BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic EntitiesVirusThe Hacker News
28.7.23Zimbra fixed actively exploited zero-day CVE-2023-38750 in ZCSVulnerebilitySecurityaffairs
28.7.23DepositFiles exposed config file, jeopardizing user securitySecuritySecurityaffairs
28.7.23Group-IB CEO Ilya Sachkov sentenced to 14 years in a strict prison colonyCrimeSecurityaffairs
28.7.23Two flaws in Linux Ubuntu affect 40% of Ubuntu usersVulnerebilitySecurityaffairs
28.7.23Two ambulance services in UK lost access to patient records after a cyber attack on software providerAttackSecurityaffairs
28.7.23FraudGPT, a new malicious generative AI tool appears in the threat landscapeAISecurityaffairs
28.7.23CISA adds Ivanti EPMM flaw to its Known Exploited Vulnerabilities catalogVulnerebilitySecurityaffairs
28.7.23Over 500K MikroTik RouterOS systems potentially exposed to hacking due to critical flawVulnerebilitySecurityaffairs
28.7.23CoinsPaid blames Lazarus hackers for theft of $37,300,000 in cryptoCryptocurrency

BleepingComputer

28.7.23BreachForums database and private chats for sale in hacker data breachIncindent

BleepingComputer

28.7.23Zimbra patches zero-day vulnerability exploited in XSS attacksVulnerebilityBleepingComputer
28.7.23SSNDOB cybercrime market admin faces 15 years after pleading guiltyCyberCrime

BleepingComputer

28.7.23WordPress Ninja Forms plugin flaw lets hackers steal submitted dataVulnerebilityBleepingComputer
28.7.238 million people hit by data breach at US govt contractor MaximusIncindent

BleepingComputer

28.7.23Swiss visa appointments cancelled in UK due to 'IT incident'IncindentBleepingComputer
28.7.23Major Security Flaw Discovered in Metabase BI Software – Urgent Update RequiredVulnerebilityThe Hacker News
28.7.23Cybersecurity Agencies Warn Against IDOR Bugs Exploited for Data BreachesExploitThe Hacker News
27.7.23GameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu UsersVulnerebilityThe Hacker News
27.7.23New Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search AdsVirusThe Hacker News
27.7.23Hackers Target Apache Tomcat Servers for Mirai Botnet and Crypto MiningCryptocurrencyThe Hacker News
27.7.23APT trends report Q2 2023APTSecurelist
27.7.23Group-IB Co-Founder Sentenced to 14 Years in Russian Prison for Alleged High TreasonCrimeThe Hacker News
27.7.23New SEC Rules Require U.S. Companies to Reveal Cyber Attacks Within 4 DaysAttackThe Hacker News
27.7.23Microsoft previews Defender for IoT firmware analysis serviceIoT

BleepingComputer

27.7.23Lazarus hackers linked to $60 million Alphapo cryptocurrency heistCryptocurrency

BleepingComputer

27.7.23Almost 40% of Ubuntu users vulnerable to new privilege elevation flawsVulnerebilityBleepingComputer
27.7.23SEC now requires companies to disclose cyberattacks in 4 daysAttack

BleepingComputer

27.7.23Windows 11 KB5028254 update fixes VPN performance issues, 27 bugsVulnerebility

BleepingComputer

27.7.23Windows 10 KB5028244 update released with 19 fixes, improved securityVulnerebility

BleepingComputer

27.7.23NATO investigates alleged data theft by SiegedSec hackersBigBrothers

BleepingComputer

27.7.23New Nitrogen malware pushed via Google Ads for ransomware attacksRansom

BleepingComputer

27.7.23Microsoft fixes bug that broke video recording in Windows appsVulnerebility

BleepingComputer

27.7.23ALPHV ransomware adds data leak API in new extortion strategyRansom

BleepingComputer

26.7.23Decoy Dog: New Breed of Malware Posing Serious Threats to Enterprise NetworksVirusThe Hacker News
26.7.23Fenix Cybercrime Group Poses as Tax Authorities to Target Latin American UsersCyberCrimeThe Hacker News
26.7.23New AI Tool 'FraudGPT' Emerges, Tailored for Sophisticated AttacksAI

The Hacker News

26.7.23Rust-based Realst Infostealer Targeting Apple macOS Users' Cryptocurrency WalletsAppleThe Hacker News
26.7.23Atlassian addressed 3 flaws in Confluence and Bamboo productsVulnerebilitySecurityaffairs
26.7.23VMware addressed an information disclosure flaw in VMware Tanzu Application Service for VMs and Isolation SegmentVulnerebilitySecurityaffairs
26.7.23Apple addressed a new actively exploited zero-day tracked as CVE-2023-38606VulnerebilitySecurityaffairs
26.7.23Twelve Norwegian ministries were hacked using a zero-day vulnerabilityVulnerebilitySecurityaffairs
26.7.23A flaw in OpenSSH forwarded ssh-agent allows remote code executionVulnerebilitySecurityaffairs
26.7.23Super Admin elevation bug puts 900,000 MikroTik devices at riskVulnerebility

BleepingComputer

26.7.23Google Chrome to offer 'Link Previews' when hovering over linksSecurity

BleepingComputer

26.7.23CISA warns govt agencies to patch Ivanti bug exploited in attacks

BigBrothers

BleepingComputer

26.7.23New Realst macOS malware steals your cryptocurrency walletsApple

BleepingComputer

26.7.23Microsoft shares temp fix for Outlook Desktop slow saving bugVulnerebility

BleepingComputer

26.7.23VMware fixes bug exposing CF API admin credentials in audit logsVulnerebilityBleepingComputer
26.7.23Over 400,000 corporate credentials stolen by info-stealing malwareIncindent

BleepingComputer

26.7.23Norway says Ivanti zero-day was used to hack govt IT systemsVulnerebility

BleepingComputer

26.7.23Microsoft Sharepoint outage caused by use of wrong TLS certificateSecurity

BleepingComputer

26.7.23Zenbleed attack leaks sensitive data from AMD Zen2 processorsAttackBleepingComputer
26.7.23Lazarus hackers hijack Microsoft IIS servers to spread malwareVirus

BleepingComputer

26.7.23Ivanti patches MobileIron zero-day bug exploited in attacksVulnerebility

BleepingComputer

26.7.23Apple fixes new zero-day used in attacks against iPhones, MacsApple

BleepingComputer

26.7.23Flipper Zero now has an app store to install third-party appsAppleBleepingComputer
26.7.23JumpCloud hack linked to North Korea after OPSEC mistake

BigBrothers

BleepingComputer

26.7.23Microsoft shares fix for some Outlook hyperlinks not openingVulnerebilityBleepingComputer
26.7.23Critical MikroTik RouterOS Vulnerability Exposes Over Half a Million Devices to HackingVulnerebilityThe Hacker News
25.7.23North Korean Nation-State Actors Exposed in JumpCloud Hack After OPSEC Blunder

BigBrothers

The Hacker News

25.7.23Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass TechniqueVirusThe Hacker News
25.7.23macOS Under Attack: Examining the Growing Threat and User PerspectivesAppleThe Hacker News
25.7.23TETRA:BURST — 5 New Vulnerabilities Exposed in Widely Used Radio Communication SystemVulnerebilityThe Hacker News
25.7.23Zenbleed: New Flaw in AMD Zen 2 Processors Puts Encryption Keys and Passwords at RiskVulnerebilityThe Hacker News
25.7.23Atlassian Releases Patches for Critical Flaws in Confluence and BambooVulnerebilityThe Hacker News
25.7.23Ivanti Releases Urgent Patch for EPMM Zero-Day Vulnerability Under Active ExploitationVulnerebilityThe Hacker News
25.7.23Apple Rolls Out Urgent Patches for Zero-Day Flaws Impacting iPhones, iPads and MacsAppleThe Hacker News

24.7.23

Experts warn of OSS supply chain attacks against the banking sectorAttackSecurityaffairs

24.7.23

Apple could opt to stop iMessage and FaceTime services due to the government’s surveillance demands

BigBrothers

Securityaffairs

24.7.23

Shadowserver reported that +15K Citrix servers are likely vulnerable to attacks exploiting the flaw CVE-2023-3519VulnerebilitySecurityaffairs

24.7.23

Norwegian government IT systems hacked using zero-day flawVulnerebilityBleepingComputer

24.7.23

Critical Zero-Days in Atera Windows Installers Expose Users to Privilege Escalation AttacksVulnerebilityThe Hacker News

24.7.23

Google Messages Getting Cross-Platform End-to-End Encryption with MLS ProtocolSafetyThe Hacker News

24.7.23

Uncovering drIBAN fraud operations. Chapter 3: Exploring the drIBAN web inject kitHacking blogCleafy

24.7.23

Uncovering drIBAN fraud operations. Chapter 2: From sLoad to RamnitHacking blogCleafy

24.7.23

Uncovering drIBAN fraud operations. Chapter 1: Introduction and MalspamHacking blogCleafy

24.7.23

How to Protect Patients and Their Privacy in Your SaaS AppsSecurityThe Hacker News

24.7.23

New OpenSSH Vulnerability Exposes Linux Systems to Remote Command InjectionVulnerebilityThe Hacker News

24.7.23

Banking Sector Targeted in Open-Source Software Supply Chain AttacksAttackThe Hacker News

24.7.23

Windows 11 23H2 update coming this fall, here's what's newOS

BleepingComputer

24.7.23

Clop now leaks data stolen in MOVEit attacks on clearweb sites

Ransom

BleepingComputer

24.7.23

Microsoft enhances Windows 11 Phishing Protection with new featuresOS

BleepingComputer

24.7.23

CISA warns govt agencies to patch Adobe ColdFusion servers

BigBrothers

BleepingComputer

23.7.23

Multiple DDoS botnets were observed targeting Zyxel devicesAttackSecurityaffairs

23.7.23

Microsoft force-migrating Windows Mail & Calendar apps to Outlook app in AugustOS

BleepingComputer

23.7.23

Windows 11 23H2 to give you greater control over power consumptionOS

BleepingComputer

23.7.23

Over 15K Citrix servers likely vulnerable to CVE-2023-3519 attacksExploit

BleepingComputer

22.7.23

CISA warns of attacks against Citrix NetScaler ADC and Gateway Devices

BigBrothers

Securityaffairs

22.7.23

Stolen Azure AD key offered widespread access to Microsoft cloud services

Hack

BleepingComputer

22.7.23

The Week in Ransomware - July 21st 2023 - Avaddon Back as NoEscape

Ransom

BleepingComputer

22.7.23

Clop gang to earn over $75 million from MOVEit extortion attacks

Ransom

BleepingComputer

22.7.23

Netscaler ADC bug exploited to breach US critical infrastructure org

Exploit

BleepingComputer

22.7.23Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance DemandsAppleThe Hacker News
22.7.23Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz ReportsAttackThe Hacker News
22.7.23HotRat: New Variant of AsyncRAT Malware Spreading Through Pirated SoftwareVirusThe Hacker News
21.7.23Experts believe North Korea behind JumpCloud supply chain attackBigBrothers

Securityaffairs

21.7.23Nice Suzuki, sport: shame dealer left your data up for grabsCyberCrime

Securityaffairs

21.7.23Experts attribute WyrmSpy and DragonEgg spyware to the Chinese APT41 groupAPT

Securityaffairs

21.7.23ALPHV/BlackCat and Clop gangs claim to have hacked cosmetics giant Estée LauderRansom

Securityaffairs

21.7.23P2PInfect, a Rusty P2P worm targets Redis Servers on Linux and Windows systemsVirus

Securityaffairs

21.7.23Adobe out-of-band update addresses an actively exploited ColdFusion zero-dayVulnerebility

Securityaffairs

21.7.23CISA: Citrix RCE bug exploited to breach critical infrastructure orgVulnerebility

BleepingComputer

21.7.23VirusTotal apologizes for data leak affecting 5,600 customersIncindentBleepingComputer
21.7.23GitHub warns of Lazarus hackers targeting devs with malicious projectsVirus

BleepingComputer

21.7.23Critical AMI MegaRAC bugs can let hackers brick vulnerable serversVulnerebility

BleepingComputer

21.7.23Google Chrome gets Windows 11's new design - how to enable itOS

BleepingComputer

21.7.23JumpCloud breach traced back to North Korean state hackersIncindentBleepingComputer
21.7.23New P2PInfect worm malware targets Linux and Windows Redis serversVirus

BleepingComputer

21.7.23APT41 hackers target Android users with WyrmSpy, DragonEgg spywareAPTBleepingComputer
21.7.23Threat Group Assessment: Mallox RansomwareRansom blogPalo Alto
21.7.23P2PInfect: The Rusty Peer-to-Peer Self-Replicating WormMalware blogPalo Alto
21.7.23BYOS – BUNDLE YOUR OWN STEALERMalware blog

Checkpoint

21.7.23MAJOR SECURITY FLAWS IN POPULAR QUICKBLOX CHAT AND VIDEO FRAMEWORK EXPOSE SENSITIVE DATA OF MILLIONSVulnerebility blog

Checkpoint

21.7.23CHINESE THREAT ACTORS TARGETING EUROPE IN SMUGX CAMPAIGNBigBrother blog

Checkpoint

21.7.23Malicious campaigns target government, military and civilian entities in Ukraine, PolandBigBrother blog

Cisco Blog

21.7.23The federal government’s cybersecurity policies are falling into place just in time to be stalled againBigBrother blog

Cisco Blog

21.7.23Memory corruption vulnerability in Microsoft Edge; MilesightVPN and router could be taken overVulnerebility blog

Cisco Blog

21.7.23Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementationOS Blog

Cisco Blog

21.7.23Why are there so many malware-as-a-service offerings?Malware blog

Cisco Blog

21.7.23Implementing an ISO-compliant threat intelligence programSecurity blog

Cisco Blog

21.7.23QR codes are relevant again for everyone from diners to threat actorsSecurity blog

Cisco Blog

21.7.23Microsoft discloses more than 130 vulnerabilities as part of July’s Patch Tuesday, four exploited in the wildVulnerebility blog

Cisco Blog

21.7.23Undocumented driver-based browser hijacker RedDriver targets Chinese speakers and internet cafesMalware blog

Cisco Blog

21.7.23What happens if AI is wrong? – Week in security with Tony AnscombeSecurity blog

Eset

21.7.238 common work-from-home scams to avoidSpam blog

Eset

21.7.23Child identity theft: how do I keep my kids’ personal data safe?Safety blog

Eset

21.7.23Protect yourself from ticketing scams ahead of the Premier League Summer Series USA TourSpam blog

Eset

21.7.23Key findings from ESET Threat Report H1 2023 – Week in security with Tony AnscombeCyber blogEset
21.7.23Sophisticated BundleBot Malware Disguised as Google AI Chatbot and UtilitiesAIThe Hacker News
21.7.23Local Governments Targeted for Ransomware – How to Prevent Falling Victim

Ransom

The Hacker News
21.7.23DDoS Botnets Hijacking Zyxel Devices to Launch Devastating AttacksBotNetThe Hacker News
21.7.23Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate ActionAttackThe Hacker News
21.7.23Mallox Ransomware Exploits Weak MS-SQL Servers to Breach Networks

Ransom

The Hacker News
21.7.23Critical Flaws in AMI MegaRAC BMC Software Expose Servers to Remote Attacks

Vulnerebility

The Hacker News
21.7.23Apache OpenMeetings Web Conferencing Tool Exposed to Critical Vulnerabilities

Vulnerebility

The Hacker News
21.7.23North Korean State-Sponsored Hackers Suspected in JumpCloud Supply Chain AttackBigBrothersThe Hacker News
21.7.23Turla's New DeliveryCheck Backdoor Breaches Ukrainian Defense SectorVirusThe Hacker News
20.7.23Ukraine’s cyber police dismantled a massive bot farm spreading propagandaCrime

Securityaffairs

20.7.23US Gov adds surveillance firms Cytrox and Intellexa to Entity List for trafficking in cyber exploitsBigBrothers

Securityaffairs

20.7.23Estée Lauder beauty giant breached by two ransomware gangs

Ransom

BleepingComputer

20.7.23Hands on with GPT-4-powered Bing AI Chat's virtual searchAI

BleepingComputer

20.7.23Meta confirms WhatsApp is down worldwideSocialBleepingComputer
20.7.23Adobe emergency patch fixes new ColdFusion zero-day used in attacks

Vulnerebility

BleepingComputer

20.7.23OpenAI credentials stolen by the thousands for sale on the dark webAI

BleepingComputer

20.7.23Microsoft: Hackers turn Exchange servers into malware control centersVirusBleepingComputer
20.7.23Microsoft expands access to cloud logging data for free after Exchange hacksIncindentBleepingComputer
20.7.23New P2PInfect Worm Targeting Redis Servers on Linux and Windows SystemsVirusThe Hacker News
20.7.23Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber ThreatsSecurityThe Hacker News
20.7.23Adobe Rolls Out New Patches for Actively Exploited ColdFusion Vulnerability

Vulnerebility

The Hacker News
19.7.23Citrix warns of actively exploited zero-day in ADC and GatewayExploit

Securityaffairs

19.7.23FIA World Endurance Championship driver passports leakedIncindent

Securityaffairs

19.7.23Virustotal data leak exposed data of some registered customers, including intelligence membersIncindent

Securityaffairs

19.7.23FIN8 Group spotted delivering the BlackCat Ransomware

Ransom

Securityaffairs

19.7.23Comprehensive analysis of initial attack samples exploiting CVE-2023-23397 vulnerability

Vulnerebility

Securelist
19.7.23Facebook behavioral ads banned by Norwegian privacy watchdogSocial

BleepingComputer

19.7.23Ukraine takes down massive bot farm, seizes 150,000 SIM cardsBigBrothers

BleepingComputer

19.7.23US govt bans European spyware vendors Intellexa and CytroxBigBrothersBleepingComputer
19.7.23FBI: Tech support scams now use shipping companies to collect cashSpamThe Hacker News
19.7.23Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg SpywareAPTThe Hacker News
19.7.23Bad.Build Flaw in Google Cloud Build Raises Concerns of Privilege Escalation

Vulnerebility

The Hacker News
19.7.23U.S. preparing Cyber Trust Mark for more secure smart devicesBigBrothers

BleepingComputer

19.7.23Cybersecurity firm Sophos impersonated by new SophosEncrypt ransomware

Ransom

BleepingComputer

19.7.23New critical Citrix ADC and Gateway flaw exploited as zero-dayExploit

BleepingComputer

19.7.23Zero-Day Attacks Exploited Critical Vulnerability in Citrix ADC and GatewayExploitThe Hacker News
18.7.23Hacking campaign targets sites using WordPress WooCommerce Payments PluginHacking

Securityaffairs

18.7.23JumpCloud revealed it was hit by a sophisticated attack by a nation-state actorAttack

Securityaffairs

18.7.23Adobe warns customers of a critical ColdFusion RCE exploited in attacksExploit

Securityaffairs

18.7.23Admins of Genesis Market marketplace sold their infrastructure on a hacker forumIncindent

Securityaffairs

18.7.23FIN8 deploys ALPHV ransomware using Sardonic malware variant

Ransom

BleepingComputer

18.7.23Google Cloud Build bug lets hackers launch supply chain attacksAttack

BleepingComputer

18.7.23Microsoft Exchange Online hit by new outage blocking emailsOS

BleepingComputer

18.7.23CISA orders govt agencies to mitigate Windows and Office zero-daysBigBrothers

BleepingComputer

18.7.23Hackers exploiting critical WordPress WooCommerce Payments bugExploit

BleepingComputer

18.7.23CISA shares free tools to help secure data in the cloudBigBrothers

BleepingComputer

18.7.23Critical ColdFusion flaws exploited in attacks to drop webshellsExploit

BleepingComputer

18.7.23Police arrests Ukrainian scareware developer after 10-year huntCrime

BleepingComputer

18.7.23IT worker jailed for impersonating ransomware gang to extort employer

Ransom

BleepingComputer

18.7.23Meet NoEscape: Avaddon ransomware gang's likely successor

Ransom

BleepingComputer

18.7.23JumpCloud discloses breach by state-backed APT hacking groupAPT

BleepingComputer

18.7.23Pakistani Entities Targeted in Sophisticated Attack Deploying ShadowPad MalwareVirus

The Hacker News

18.7.23VirusTotal Data Leak Exposes Some Registered Customers' DetailsIncindentThe Hacker News
18.7.23FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware AttacksVirus

The Hacker News

18.7.23Owner of BreachForums Pleads Guilty to Cybercrime and Child Pornography ChargesHackingThe Hacker News
18.7.23Cybercriminals Exploiting WooCommerce Payments Plugin Flaw to Hijack WebsitesExploit

The Hacker News

18.7.23JumpCloud Blames 'Sophisticated Nation-State' Actor for Security BreachIncindentThe Hacker News
18.7.23Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious AppsExploit

The Hacker News

17.7.23Cisco fixed a critical flaw in SD-WAN vManage

Vulnerebility

Securityaffairs

17.7.23Pompompurin, the BreachForums owner, pleads guilty to hacking charges and possession of child pornographyHacking

Securityaffairs

17.7.23WormGPT, the generative AI tool to launch sophisticated BEC attacksVirus

Securityaffairs

17.7.23Russia-linked APT Gamaredon starts stealing data from victims between 30 and 50 minutes after the initial compromiseAPT

Securityaffairs

17.7.23Windows Copilot arrives in the fall with Windows 11 23H2OS

BleepingComputer

17.7.23Thousands of images on Docker Hub leak auth secrets, private keysIncindent

BleepingComputer

17.7.23Gamaredon hackers start stealing data 30 minutes after a breachExploit

BleepingComputer

17.7.23Malicious USB Drives Targetinging Global Targets with SOGU and SNOWYDRIVE MalwareVirusThe Hacker News
17.7.23Cybercriminals Exploit Microsoft Word Vulnerabilities to Deploy LokiBot MalwareExploit

The Hacker News

17.7.23CERT-UA Uncovers Gamaredon's Rapid Data Exfiltration Tactics Following Initial CompromiseBigBrothersThe Hacker News
17.7.23WormGPT: New AI Tool Allows Cybercriminals to Launch Sophisticated Cyber AttacksVirus

The Hacker News

15.7.23

Six Malicious Python Packages in the PyPI Targeting Windows Users

Malware blog

Palo Alto

15.7.23

BEYOND THE HORIZON: TRAVELING THE WORLD ON CAMARO DRAGON’S USB FLASH DRIVES

Malware blog

Checkpoint

15.7.23

CHINESE THREAT ACTORS TARGETING EUROPE IN SMUGX CAMPAIGN

BigBrother blog

Checkpoint

15.7.23

MAJOR SECURITY FLAWS IN POPULAR QUICKBLOX CHAT AND VIDEO FRAMEWORK EXPOSE SENSITIVE DATA OF MILLIONS

Vulnerebility blog

Checkpoint

15.7.23

STEALTH SOLDIER BACKDOOR USED IN TARGETED ESPIONAGE ATTACKS IN NORTH AFRICA

Malware blog

Checkpoint

15.7.23

RUST BINARY ANALYSIS, FEATURE BY FEATURE

Malware blog

Checkpoint

15.7.23

MALWARE SPOTLIGHT: CAMARO DRAGON’S TINYNOTE BACKDOOR

Malware blog

Checkpoint

15.7.23

Old certificate, new signature: Open-source tools forge signature timestamps on Windows drivers

OS Blog

Cisco Blog

15.7.23

Undocumented driver-based browser hijacker RedDriver targets Chinese speakers and internet cafes

BigBrother blog

Cisco Blog

15.7.23

Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation

OS Blog

Cisco Blog

15.7.23

Malicious campaigns target government, military and civilian entities in Ukraine, Poland

BigBrother blog

Cisco Blog

15.7.23

QR codes are relevant again for everyone from diners to threat actors

Hacking blog

Cisco Blog

15.7.23

Microsoft discloses more than 130 vulnerabilities as part of July’s Patch Tuesday, four exploited in the wild

Vulnerebility blog

Cisco Blog

15.7.23

The danger within: 5 steps you can take to combat insider threats

Cyber blog

Eset

15.7.23

ESET Research Podcast: Finding the mythical BlackLotus bootkit

Malware blog

Eset

15.7.23

Analysis of Storm-0558 techniques for unauthorized email access

Hacking blog

Microsoft

15.7.23The source code of the BlackLotus UEFI Bootkit was leaked on GitHubVirus

Securityaffairs

15.7.23US CISA warns of Rockwell Automation ControlLogix flaws

Vulnerebility

Securityaffairs

15.7.23Indexing Over 15 Million WordPress Websites with PWNPressIncindent

Securityaffairs

15.7.23New AVrecon botnet remained under the radar for two years while targeting SOHO RoutersBotNet

Securityaffairs

15.7.23Apple re-released Rapid Security Response to fix recently disclosed zero-dayApple

Securityaffairs

15.7.23Zimbra urges customers to manually fix actively exploited zero-day reported by Google TAGExploit

Securityaffairs

15.7.23Chinese hackers compromised emails of U.S. Government agenciesBigBrothers

Securityaffairs

15.7.23SonicWall urges organizations to fix critical flaws in GMS/Analytics products

Vulnerebility

Securityaffairs

15.7.23Citrix fixed a critical flaw in Secure Access Client for Ubuntu

Vulnerebility

Securityaffairs

15.7.23Cl0p hacker operating from Russia-Ukraine war front line – exclusiveBigBrothers

Securityaffairs

15.7.23Fortinet fixed a critical flaw in FortiOS and FortiProxy

Vulnerebility

Securityaffairs

15.7.23Microsoft mitigated an attack by Chinese threat actor Storm-0558BigBrothers

Securityaffairs

15.7.23Unpatched Office zero-day CVE-2023-36884 actively exploited in targeted attacks

Vulnerebility

Securityaffairs

15.7.23HCA Healthcare data breach impacted 11 million patientsIncindent

Securityaffairs

15.7.23Apple issued Rapid Security Response updates to fix a zero-day but pulled them due to a Safari bugApple

Securityaffairs

15.7.23VMware warns customers of exploit available for critical vRealize RCE flaw CVE-2023-20864

Vulnerebility

Securityaffairs

15.7.23Cybercriminals Evolve Antidetect Tooling for Mobile OS-Based FraudCyberCrime

Securityaffairs

15.7.23Experts released PoC exploit for Ubiquiti EdgeRouter flawExploit

Securityaffairs

15.7.23RomCom RAT attackers target groups supporting NATO membership of UkraineVirus

Securityaffairs

15.7.23A flaw in Revolut US payments resulted in the theft of $20 Million

Vulnerebility

Securityaffairs

15.7.23France’s government is giving the police more surveillance powerBigBrothers

Securityaffairs

15.7.23Two spyware sending data of more than 1.5M users to China were found in Google Play StoreAndroid

Securityaffairs

15.7.23Google addressed 3 actively exploited flaws in AndroidAndroidSecurityaffairs
15.7.23Microsoft Bug Allowed Hackers to Breach Over Two Dozen Organizations via Forged Azure AD Tokens

Vulnerebility

The Hacker News
15.7.23Critical Security Flaws Uncovered in Honeywell Experion DCS and QuickBlox Services

Vulnerebility

The Hacker News

15.7.23Genesis Market infrastructure and inventory sold on hacker forumIncindent

BleepingComputer

15.7.23Microsoft still unsure how hackers stole Azure AD signing keyIncindent

BleepingComputer

15.7.23Rockwell warns of new APT RCE exploit targeting critical infrastructureExploit

BleepingComputer

15.7.23WordPress AIOS plugin used by 1M sites logged plaintext passwordsIncindent

BleepingComputer

15.7.23BreachForums owner Pompompurin pleads guilty to hacking chargesHacking

BleepingComputer

15.7.23Colorado State University says data breach impacts students, staffIncindent

BleepingComputer

15.7.23Shutterfly says Clop ransomware attack did not impact customer data

Ransom

BleepingComputer

15.7.23AVrecon malware infects 70,000 Linux routers to build botnetVirus

BleepingComputer

15.7.23Cisco SD-WAN vManage impacted by unauthenticated REST API access

Vulnerebility

BleepingComputer

15.7.23Google Play will enforce business checks to curb malware submissionsAndroid

BleepingComputer

15.7.23Windows 11 23H2 coming this fall as a small enablement packageOS

BleepingComputer

15.7.23Fake Linux vulnerability exploit drops data-stealing malwareVirus

BleepingComputer

15.7.23Zimbra urges admins to manually fix zero-day exploited in attacks

Vulnerebility

BleepingComputer

15.7.23Source code for BlackLotus Windows UEFI malware leaked on GitHubVirus

BleepingComputer

14.7.23TeamTNT's Cloud Credential Stealing Campaign Now Targets Azure and Google CloudVirusThe Hacker News
14.7.23New SOHO Router Botnet AVrecon Spreads to 70,000 Devices Across 20 CountriesBotNet

The Hacker News

14.7.23Zimbra Warns of Critical Zero-Day Flaw in Email Software Amid Active Exploitation

Vulnerebility

The Hacker News
14.7.23PicassoLoader Malware Used in Ongoing Attacks on Ukraine and PolandVirus

The Hacker News

14.7.23TeamTNT's Silentbob Botnet Infecting 196 Hosts in Cloud Attack CampaignBotNetThe Hacker News
13.7.23Fake PoC for Linux Kernel Vulnerability on GitHub Exposes Researchers to Malware

Vulnerebility

The Hacker News

13.7.23Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote AttacksICS

The Hacker News

13.7.23U.S. Government Agencies' Emails Compromised in China-Backed Cyber AttackBigBrothersThe Hacker News
13.7.23New Vulnerabilities Disclosed in SonicWall and Fortinet Network Security Products

Vulnerebility

The Hacker News

13.7.23USB drive malware attacks spiking again in first half of 2023Virus

BleepingComputer

13.7.23New PyLoose Linux malware mines crypto directly from memoryVirus

BleepingComputer

13.7.23Apple re-releases zero-day patch after fixing browsing issueApple

BleepingComputer

13.7.23SonicWall warns admins to patch critical auth bypass bugs immediately

Vulnerebility

BleepingComputer

13.7.23Russian state hackers lure Western diplomats with BMW car adsBigBrothers

BleepingComputer

13.7.23New Windows 11 build ships with more Rust-based Kernel featuresOS

BleepingComputer

13.7.23Critical RCE found in popular Ghostscript open-source PDF library

Vulnerebility

BleepingComputer

13.7.23GitHub goes passwordless, announces passkeys beta previewSecurity

BleepingComputer

13.7.23Fortinet warns of critical RCE flaw in FortiOS, FortiProxy devices

Vulnerebility

BleepingComputer

13.7.23Ransomware payments on record-breaking trajectory for 2023

Ransom

BleepingComputer
13.7.23Microsoft: Chinese hackers breached US govt Exchange email accountsBigBrothers

BleepingComputer

13.7.23What's new in the Windows 11 22H2 Moment 3 update, now availableOS

BleepingComputer

13.7.23Microsoft: Unpatched Office zero-day exploited in NATO summit attacksBigBrothersBleepingComputer
13.7.23Windows 11 KB5028185 cumulative update released with Moment 3 features

Vulnerebility

BleepingComputer
13.7.23Windows 10 KB5028168 and KB5028166 updates released

Vulnerebility

BleepingComputer

13.7.23Microsoft July 2023 Patch Tuesday warns of 6 zero-days, 132 flaws

Vulnerebility

BleepingComputer

13.7.23Hackers exploit Windows policy to load malicious kernel drivers

Exploit

BleepingComputer
13.7.23Microsoft rebrands Azure Active Directory to Microsoft Entra IDOSBleepingComputer
13.7.23Deutsche Bank confirms provider breach exposed customer dataIncindent

BleepingComputer

13.7.23Apple confirms WebKit security updates break browsing on some sitesApple

BleepingComputer

13.7.23HCA confirms breach after hacker steals data of 11 million patientsIncindentBleepingComputer
12.7.23Ransomware Extortion Skyrockets in 2023, Reaching $449.1 Million and Counting

Ransom

The Hacker News
12.7.23Microsoft Thwarts Chinese Cyber Attack Targeting Western European GovernmentsBigBrothers

The Hacker News

12.7.23Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming SectorVirusThe Hacker News
12.7.23Python-Based PyLoose Fileless Attack Targets Cloud Workloads for Cryptocurrency MiningCryptocurrency

The Hacker News

12.7.23Microsoft Releases Patches for 132 Vulnerabilities, Including 6 Under Active Attack

Vulnerebility

The Hacker News
12.7.23Hackers Exploit Windows Policy Loophole to Forge Kernel-Mode Driver Signatures

Exploit

The Hacker News

11.7.23SCARLETEEL Cryptojacking Campaign Exploiting AWS Fargate in Ongoing CampaignCryptocurrencyThe Hacker News
11.7.23Beware of Big Head Ransomware: Spreading Through Fake Windows Updates

Vulnerebility

The Hacker News

11.7.23Microsoft finally fixes broken Surface Pro X laptop camerasOS

BleepingComputer

11.7.23RomCom hackers target NATO Summit attendees in phishing attacksBigBrothers

BleepingComputer

11.7.23VMware warns of exploit available for critical vRealize RCE bug

Vulnerebility

BleepingComputer

11.7.23Amazon's AppStore is getting more apps and games on Windows 11OS

BleepingComputer

11.7.23Microsoft: Windows 11 21H2 reaching end of service in OctoberOS

BleepingComputer

11.7.23Apple releases emergency update to fix zero-day exploited in attacksApple

BleepingComputer

11.7.23Former employee charged for attacking water treatment plantAttackBleepingComputer
11.7.23Hands on with Windows Copilot - A Bing.com web wrapperOS

BleepingComputer

11.7.23Razer investigates data breach claims, resets user sessionsIncindent

BleepingComputer

11.7.23Microsoft Edge's Bing AI sidebar will remember previous conversationsOSBleepingComputer
11.7.23Microsoft Edge Canary update on Windows adds mouse gestures flagOS

BleepingComputer

11.7.23Apple Issues Urgent Patch for Zero-Day Flaw Targeting iOS, iPadOS, macOS, and SafariAppleThe Hacker News
10.7.23New TOITOIN Banking Trojan Targeting Latin American BusinessesVirus

The Hacker News

10.7.23New Mozilla Feature Blocks Risky Add-Ons on Specific Websites to Safeguard User Security

Security

The Hacker News
10.7.23RomCom RAT Targeting NATO and Ukraine Support GroupsBigBrothers

The Hacker News

10.7.23Hackers Steal $20 Million by Exploiting Flaw in Revolut's Payment SystemsIncindentThe Hacker News
9.7.23Chrome's big design refresh uses Microsoft Mica effect in custom themesOS

BleepingComputer

9.7.23Charming Kitten hackers use new ‘NokNok’ malware for macOSApple

BleepingComputer

9.7.23Windows Subsystem for Android gets July 2023 preview with new featuresOS

BleepingComputer

9.7.23AMD releases Adrenalin 23.7.1 WHQL driver for WindowsOSBleepingComputer
9.7.23Instagram's Threads to get Twitter-like hashtags support, edit button and moreSocial

BleepingComputer

9.7.23New ‘Big Head’ ransomware displays fake Windows update alert

Ransom

BleepingComputer
8.7.23Iran-linked APT TA453 targets Windows and macOS systemsAPT

Securityaffairs

8.7.23Bangladesh government website leaked data of millions of citizensBigBrothers

Securityaffairs

8.7.23A man has been charged with a cyber attack on the Discovery Bay water treatment facilityAttack

Securityaffairs

8.7.23Progress warns customers of a new critical flaw in MOVEit Transfer software

Vulnerebility

Securityaffairs
8.7.23Email crypto phishing scams: stealing from hot and cold crypto walletsPhishingSecurelist
8.7.23CISA warns govt agencies to patch actively exploited Android driver

Vulnerebility

BleepingComputer

8.7.23Critical TootRoot bug lets attackers hijack Mastodon servers

Vulnerebility

BleepingComputer

8.7.23Barracuda working on fix for ongoing Email Gateway login issues

Vulnerebility

BleepingComputer

8.7.23MOVEit Transfer customers warned to patch new critical flaw

Vulnerebility

BleepingComputer
8.7.23Two Spyware Apps on Google Play with 1.5 Million Users Sending Data to ChinaAndroid

The Hacker News

8.7.23Vishing Goes High-Tech: New 'Letscall' Malware Employs Voice Traffic RoutingVirusThe Hacker News
8.7.23Another Critical Unauthenticated SQLi Flaw Discovered in MOVEit Transfer Software

Vulnerebility

The Hacker News
8.7.23Mastodon Social Network Patches Critical Flaws Allowing Server Takeover

Vulnerebility

The Hacker News

7.7.23CISA and FBI warn of Truebot infecting US and Canada based organizationsBigBrothers

Securityaffairs

7.7.23Cisco warns of a flaw in Nexus 9000 series switches that allows modifying encrypted traffic

Vulnerebility

Securityaffairs

7.7.23StackRot, a new Linux Kernel privilege escalation vulnerability

Vulnerebility

Securityaffairs

7.7.23Ransomware accounts for 54% of cyber threats in the health sector

Ransom

Securityaffairs

7.7.23CVE-2022-29303 flaw in SolarView product can be exploited in attacks against the energy sector

Vulnerebility

Securityaffairs

7.7.23

RedEnergy Stealer-as-a-Ransomware employed in attacks in the wild

Ransom

Securityaffairs

7.7.23The Port of Nagoya, the largest Japanese port, suffered a ransomware attack

Ransom

Securityaffairs

7.7.23Apps with 1.5M installs on Google Play send your data to ChinaAndroid

BleepingComputer

7.7.23CISA: Netwrix Auditor RCE bug exploited in Truebot malware attacksVirus

BleepingComputer

7.7.23Nickelodeon investigates breach after leak of 'decades old’ dataIncindent

BleepingComputer

7.7.23

BlackByte 2.0 Ransomware: Infiltrate, Encrypt, and Extort in Just 5 Days

Ransom

The Hacker News
7.7.23Google Releases Android Patch Update for 3 Actively Exploited VulnerabilitiesAndroidThe Hacker News
7.7.23JumpCloud Resets API Keys Amid Ongoing Cybersecurity IncidentIncindent

The Hacker News

7.7.23Cybersecurity Agencies Sound Alarm on Rising TrueBot Malware AttacksVirus

The Hacker News

7.7.23

Iranian Hackers' Sophisticated Malware Targets Windows and macOS UsersApple

The Hacker News

6.7.23

Microsoft investigates Outlook.com bug breaking email search

Vulnerebility

BleepingComputer

6.7.23

Cisco warns of bug that lets attackers break traffic encryption

Vulnerebility

BleepingComputer

6.7.23

JumpCloud resets admin API keys amid ‘ongoing incident’

Incindent

BleepingComputer

6.7.23

Android July security updates fix three actively exploited bugs

Android

BleepingComputer

6.7.23

Over 130,000 solar energy monitoring systems exposed online

Incindent

BleepingComputer

6.7.23

Microsoft fixes bug behind Windows LSA protection warnings, again

Vulnerebility

BleepingComputer

6.7.23

New StackRot Linux kernel flaw allows privilege escalation

Vulnerebility

BleepingComputer

6.7.23

New tool exploits Microsoft Teams bug to send malware to users

Virus

BleepingComputer

6.7.23

Police arrest suspect linked to notorius OPERA1ER cybercrime gang

Crime

BleepingComputer

6.7.23

Japan’s largest port stops operations after ransomware attack

Ransom

BleepingComputer

6.7.23

Google Analytics data transfer to U.S. brings $1 million fine to Swedish firms

Cyber

BleepingComputer

6.7.23Researchers Uncover New Linux Kernel 'StackRot' Privilege Escalation VulnerabilityVulnerebilityThe Hacker News
6.7.23Silentbob Campaign: Cloud-Native Environments Under AttackAttackThe Hacker News
6.7.23INTERPOL Nabs Hacking Crew OPERA1ER's Leader Behind $11 Million CybercrimeCrimeThe Hacker News
6.7.23RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and Telecom SectorsRansomThe Hacker News
5.7.23Node.js Users Beware: Manifest Confusion Attack Opens Door to MalwareVirusThe Hacker News
5.7.23Instagram's Twitter Alternative 'Threads' Launch Halted in Europe Over Privacy ConcernsSocialThe Hacker News
5.7.23Swedish Data Protection Authority Warns Companies Against Google Analytics UseBigBrothersThe Hacker News
4.7.23Neo_Net runs eCrime campaign targeting clients of banks globallyCyberCrimeSecurityaffairs
4.7.23Hackers stole millions of dollars worth of crypto assets from Poly Network platformIncindentSecurityaffairs
4.7.23335,923 out of 489,337 Fortinet firewalls vulnerable to CVE-2023-27997VulnerebilitySecurityaffairs
4.7.23Anonymous Sudan claims to have stolen 30 million Microsoft’s customer accountsIncindentSecurityaffairs
4.7.23SmugX: Chinese APT uses HTML smuggling to target European Ministries and embassiesAPTSecurityaffairs
4.7.23The Impacts of Data Loss on Your OrganizationSecuritySecurityaffairs
4.7.23CISA adds Samsung and D-link bugs to its Known Exploited Vulnerabilities catalogVulnerebilitySecurityaffairs
4.7.23New Python tool checks NPM packages for manifest confusion issuesVirusBleepingComputer
4.7.23Microsoft denies data breach, theft of 30 million customer accountsIncindentBleepingComputer
4.7.23Hackers target European government entities in SmugX campaignBigBrothersBleepingComputer
4.7.23Microsoft Edge upgrades built-in Cloudflare VPN with 5GB of dataSecurityBleepingComputer
4.7.23DDoSia Attack Tool Evolves with Encryption, Targeting Multiple SectorsAttackThe Hacker News
4.7.23Mexico-Based Hacker Targets Global Banks with Android MalwareAndroidThe Hacker News
4.7.23Alert: 330,000 FortiGate Firewalls Still Unpatched to CVE-2023-27997 RCE FlawVulnerebilityThe Hacker News
4.7.23Chinese Hackers Use HTML Smuggling to Infiltrate European Ministries with PlugXVirusThe Hacker News
3.7.23New Windows Meduza Stealer targets tens of crypto wallets and password managersVirusSecurityaffairs
3.7.23Experts detected a new variant of North Korea-linked RUSTBUCKET macOS malwareAppleSecurityaffairs
3.7.23WordPress sites using the Ultimate Member plugin are under attackHackingSecurityaffairs
3.7.23300,000+ Fortinet firewalls vulnerable to critical FortiOS RCE bugVulnerebilityBleepingComputer
3.7.23Twitter's bot spam keeps getting worse — it's about porn this timeSocialBleepingComputer
3.7.23Snappy: A tool to detect rogue WiFi access points on open networksSecurityBleepingComputer
3.7.23CISA Flags 8 Actively Exploited Flaws in Samsung and D-Link DevicesVulnerebilityThe Hacker News
3.7.23Evasive Meduza Stealer Targets 19 Password Managers and 76 Crypto WalletsVirusThe Hacker News
3.7.23BlackCat Operators Distributing Ransomware Disguised as WinSCP via MalvertisingRansomThe Hacker News
2.7.23LockBit gang demands a $70 million ransom to the semiconductor manufacturing giant TSMCRansomSecurityaffairs
2.7.23Avast released a free decryptor for the Windows version of the Akira ransomwareRansomSecurityaffairs
2.7.23BlackCat ransomware pushes Cobalt Strike via WinSCP search adsRansomBleepingComputer
1.7.23Iran-linked Charming Kitten APT enhanced its POWERSTAR BackdoorAPTSecurityaffairs
1.7.23miniOrange’s WordPress Social Login and Register plugin was affected by a critical auth bypass bugVulnerebilitySecurityaffairs
1.7.23North Korea-linked Andariel APT used a new malware named EarlyRat last yearVirusSecurityaffairs
1.7.23The phone monitoring app LetMeSpy disclosed a data breachMobilSecurityaffairs
1.7.23Previously undetected ThirdEye malware appears in the threat landscapeVirusSecurityaffairs
1.7.23Former Group-IB manager has been arrested in KazahstanCyberCrimeSecurityaffairs
1.7.23Experts published PoC exploits for Arcserve UDP authentication bypass issueExploitSecurityaffairs
1.7.23Using Electromagnetic Fault Injection Attacks to take over dronesHackingSecurityaffairs
1.7.23Experts warn of a spike in May and June of 8Base ransomware attacksRansomSecurityaffairs
1.7.23Critical SQL Injection flaws in Gentoo Soko can lead to Remote Code ExecutionVulnerebilitySecurityaffairs
1.7.23EncroChat dismantling led to 6,558 arrests and the seizure of $979M in criminal fundsCyberCrimeSecurityaffairs
1.7.23Mockingjay process injection technique allows EDR bypassHackingSecurityaffairs
1.7.23Experts found hundreds of devices within federal networks having internet-exposed management interfacesMobilSecurityaffairs
1.7.23The Week in Ransomware - June 30th 2023 - Mistaken IdentityRansomBleepingComputer
1.7.23Hackers exploit zero-day in Ultimate Member WordPress plugin with 200K installsExploitBleepingComputer
1.7.23Twitter now forces you to sign in to view tweetsSocialBleepingComputer
1.7.23New proxyjacking attacks monetize hacked SSH servers’ bandwidthAttackBleepingComputer
1.7.23Free Akira ransomware decryptor helps recover your filesRansomBleepingComputer
1.7.23CISA issues DDoS warning after attacks hit multiple US orgsBigBrothersBleepingComputer
1.7.23TSMC denies LockBit hack as ransomware gang demands $70 millionRansomBleepingComputer
1.7.23Hackers Exploiting Unpatched WordPress Plugin Flaw to Create Secret Admin AccountsHackingThe Hacker News
1.7.23Beware: New 'Rustbucket' Malware Variant Targeting macOS UsersAppleThe Hacker News
1.7.23Iranian Hackers Using POWERSTAR Backdoor in Targeted Espionage AttacksBigBrothersThe Hacker News