Hacking

Threat actors exploit a flaw in Digium Phone Software to target VoIP servers

Threat actors are targeting VoIP servers by exploiting a vulnerability in Digium's software to install a web shell, Palo Alto…

3 years ago

Tainted password-cracking software for industrial systems used to spread P2P Sality bot

Dragos researchers uncovered a small-scale campaign targeting industrial engineers and operators with Sality malware. During a routine vulnerability assessment, Dragos…

3 years ago

Experts warn of attacks on sites using flawed Kaswara Modern WPBakery Page Builder Addons

Researchers spotted a massive campaign that scanned close to 1.6 million WordPress sites for vulnerable Kaswara Modern WPBakery Page Builder…

3 years ago

Holy Ghost ransomware operation is linked to North Korea

Microsoft researchers linked the Holy Ghost ransomware (H0lyGh0st) operation to North Korea-linked threat actors. The Microsoft Threat Intelligence Center (MSTIC)…

3 years ago

Mantis botnet powered the largest HTTPS DDoS attack in June

The largest HTTPS DDoS attack recently mitigated by Cloudflare was launched by the Mantis botnet. In June 2022, DDoS mitigation…

3 years ago

Microsoft published exploit code for a macOS App sandbox escape flaw

Microsoft published the exploit code for a vulnerability in macOS that can allow an attacker to escape the sandbox. Microsoft publicly disclosed…

3 years ago

Three UEFI Firmware flaws found in tens of Lenovo Notebook models

IT giant Lenovo released security fixes to address three vulnerabilities that impact the UEFI firmware shipped with over 70 product…

3 years ago

Large-scale AiTM phishing campaign targeted +10,000 orgs since 2021

A large-scale phishing campaign used adversary-in-the-middle (AiTM) phishing sites to hit more than 10,000 organizations Microsoft observed a large-scale phishing campaign…

3 years ago

The President of European Central Bank Christine Lagarde targeted by hackers

Christine Lagarde, the president of the European Central Bank, was the target of a failed hacking attempt. The European Central…

3 years ago

Flaws in the ExpressLRS Protocol allow the takeover of drones

The protocol for radio-controlled (RC) drones, named ExpressLRS, is affected by vulnerabilities that can allow device takeover. Researchers warn of…

3 years ago

This website uses cookies.