Hacking

Atlassian addresses a critical Jira authentication bypass flaw

Atlassian fixed a critical flaw in its Jira software, tracked as CVE-2022-0540, that could be exploited to bypass authentication. Atlassian…

3 years ago

Since declaring cyber war on Russia Anonymous leaked 5.8 TB of Russian data

OpRussia continues unabated, since declaring 'cyber war' on Russia Anonymous has now published approximately 5.8 TB of Russian data. The…

3 years ago

T-Mobile confirms Lapsus$ had access its systems

Telecommunication giant T-Mobile confirmed the LAPSUS$ extortion group gained access to its networks in March. Telecom company T-Mobile on Friday revealed that…

3 years ago

Phishing attacks using the topic “Azovstal” targets entities in Ukraine

Ukraine CERT-UA warns of phishing attacks on state organizations of Ukraine using the topic "Azovstal" and Cobalt Strike Beacon. The…

3 years ago

A stored XSS flaw in RainLoop allows stealing users’ emails

Experts disclose an unpatched vulnerability in the RainLoop webmail client, tracked as CVE-2022-29360, that can be exploited to steal users'…

3 years ago

QNAP firmware updates fix Apache HTTP vulnerabilities in its NAS

Taiwanese vendor QNAP warns users to update their NAS Firmware to fix Apache HTTP flaws addressed in the Apache HTTP…

3 years ago

Pwn2Own Miami hacking contest awarded $400,000 for 26 unique ICS exploits

Which hat hackers that participated in the Pwn2Own Miami 2022 hacking contest earned a total of $400,000 for their ICS…

3 years ago

Lemon_Duck cryptomining botnet targets Docker servers

The Lemon_Duck cryptomining botnet is targeting Docker servers to mine cryptocurrency on Linux systems. Crowdstrikes researchers reported that the Lemon_Duck cryptomining botnet…

3 years ago

Critical bug in decoder used by popular chipsets exposes 2/3 of Android devices to hack

A critical RCE flaw in Android devices running on Qualcomm and MediaTek chipsets could allow access to users' media files.…

3 years ago

Cybercriminals Deliver IRS Tax Scams & Phishing Campaigns By Mimicking Government Vendors

Threat intelligence firm Resecurity details how crooks are delivering IRS tax scams and phishing attacks posing as government vendors. Cybercriminals…

3 years ago

This website uses cookies.