New York Times source code compromised via exposed GitHub token

2 years ago

The source code and data of The New York Times leaked on the 4chan was stolen from the company's GitHub…

SolarWinds fixed multiple flaws in Serv-U and SolarWinds Platform

2 years ago

SolarWinds addressed multiple vulnerabilities in Serv-U and the SolarWinds Platform, including a bug reported by a pentester working with NATO.…

Pandabuy was extorted twice by the same threat actor

2 years ago

Chinese shopping platform Pandabuy previously paid a ransom demand to an extortion group that extorted the company again this week.…

UAC-0020 threat actor used the SPECTR Malware to target Ukraine’s defense forces<gwmw style="display:none;"></gwmw>

2 years ago

Ukraine CERT-UA warned of cyber attacks targeting defense forces with SPECTR malware as part of a cyber espionage campaign dubbed…

Chinese threat actor exploits old ThinkPHP flaws since October 2023

2 years ago

Akamai observed a Chinese-speaking group exploiting two flaws, tracked as CVE-2018-20062 and CVE-2019-9082, in ThinkPHP applications. Akamai researchers observed a…

A new Linux version of TargetCompany ransomware targets VMware ESXi environments

2 years ago

A new Linux variant of the TargetCompany ransomware family targets VMware ESXi environments using a custom shell script. A new variant…

FBI obtained 7,000 LockBit decryption keys, victims should contact the feds to get support

2 years ago

The FBI is informing victims of LockBit ransomware it has obtained over 7,000 LockBit decryption keys that could allow some…

RansomHub operation is a rebranded version of the Knight RaaS

2 years ago

Researchers believe the RansomHub ransomware-as-a-service is a rebranded version of the Knight ransomware operation. Cybersecurity experts who analyzed the recently…

Malware can steal data collected by the Windows Recall tool, experts warn

2 years ago

Cybersecurity researchers demonstrated how malware could potentially steal data collected by the new Windows Recall tool. The Recall feature of…

Cisco addressed Webex flaws used to compromise German government meetings

2 years ago

Cisco addressed vulnerabilities that were exploited to compromise the Webex meetings of the German government. In early May, German media…

This website uses cookies.