Researchers have found three backdoors and four miners in attacks exploiting the Log4Shell vulnerability, some of which are still ongoing.
...moreTotal Articles Found: 18
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2022-03-29 20:33:08
Popularity: 52
Author: Lisa Vaas
Keywords:
Researchers have found three backdoors and four miners in attacks exploiting the Log4Shell vulnerability, some of which are still ongoing.
...morePublished: 2021-11-05 17:00:57
Popularity: 932
Author: Lisa Vaas
Keywords:
CISA is urging vendors to patch, given the release of public exploit code & a proof of concept tool for bugs that open billions of devices – phones, PCs, toys, etc. – to DoS & code execution.
...morePublished: 2021-11-08 16:38:05
Popularity: 36
Author: Lisa Vaas
Keywords:
Researchers have spotted a second, worldwide campaign exploiting the Zoho zero-day: one that’s breached defense, energy and healthcare organizations.
...morePublished: 2021-11-02 17:20:42
Popularity: 49
Author: Lisa Vaas
Keywords:
Google’s Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.
...morePublished: 2021-10-18 16:23:21
Popularity: 88
Author: Lisa Vaas
Keywords:
The accounts were used to catfish security researchers into downloading malware in a long-running cyber-espionage campaign attributed to North Korea.
...morePublished: 2021-10-01 20:08:23
Popularity: 191
Author: Lisa Vaas
Keywords:
Coinbase suspects phishing led to attackers getting personal details needed to access wallets but also blamed a flaw in its SMS-based 2FA.
...morePublished: 2021-09-09 14:30:56
Popularity: 115
Author: Lisa Vaas
Keywords:
Grayfly campaigns have launched the novel malware against businesses in Taiwan, Vietnam, the US and Mexico and are targeting Exchange and MySQL servers.
...morePublished: 2021-09-09 22:49:27
Popularity: 39
Author: Lisa Vaas
Keywords:
They were posted for free by former Babuk gang members who’ve bickered, squabbled and huffed off to start their own darn ransomware businesses, dagnabbit.
...moreThe newborn platform was inundated by Sonic the Hedgehog-themed porn and had prominent users' profiles defaced. Next, hackers posted its user database online.
...moreThe driver, called "Netfilter," is a rootkit that talks to Chinese C2 IPs and aims to spoof gamers' geo-locations to cheat the system and play from anywhere, Microsoft said.
...moreThe 9.4-rated bug in AppC could give attackers admin rights, no authentication required, letting them attack anything from PoS to industrial control systems.
...morePublished: 2020-05-14 12:52:57
Popularity: 2329
Author: Lisa Vaas
Keywords:
She wanted a sub, not Facebook, Instagram and SMS come-ons from the guy who served her and intercepted her contact-tracing details.
...morePublished: 2020-03-05 11:03:22
Popularity: 741
Author: Lisa Vaas
Keywords:
It's charging subpar password security and lousy user notification: Zynga has yet to notify users to warn them of the breach, the suit says.
...morePublished: 2020-03-04 11:57:54
Popularity: 339
Author: Lisa Vaas
Keywords:
We don't want to see what you do behind closed doors, but lots of hackers would be happy to pull up a chair to view that video stream.
...morePublished: 2020-01-09 11:41:31
Popularity: 188
Author: Lisa Vaas
Keywords:
This could signal a renewed war between Apple and law enforcement over breaking encryption.
...morePublished: 2019-09-06 09:41:13
Popularity: 100
Author: Lisa Vaas
Keywords:
Two problems, Twitter says: vulnerabilities that mobile carriers need to fix & its reliance on linked numbers for 2FA.
...morePublished: 2019-06-28 12:25:37
Popularity: 483
Author: Lisa Vaas
Keywords:
"I'm not a voyeur, I'm a technology enthusiast,” says the creator, who combined deepfake AI with a need for cash to get ka-CHING!
...morePublished: 2019-04-24 11:12:56
Popularity: 77
Author: Lisa Vaas
Keywords:
The privacy think tank had them for 20 days, and one of the docs was already displayed at a conference, but the NYPD is still clawing them back.
...more