information security news

WhatsApp fixed zero-day flaw used to deploy Paragon Graphite spyware

WhatsApp fixed a zero-click, zero-day vulnerability used to install Paragon's Graphite spyware on the devices of targeted individuals. WhatsApp has…

9 months ago

California Cryobank, the largest US sperm bank, disclosed a data breach

California Cryobank, the largest US sperm bank, suffered a data breach exposing customer information. California Cryobank (CCB) is the largest…

9 months ago

Rules File Backdoor: AI Code Editors exploited for silent supply chain attacks

The Rules File Backdoor attack targets AI code editors like GitHub Copilot and Cursor, making them inject malicious code via…

9 months ago

U.S. CISA adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalog. The U.S.…

9 months ago

ChatGPT SSRF bug quickly becomes a favorite attack vector

Threat actors exploit a server-side request forgery (SSRF) flaw, tracked as CVE-2024-27564, in ChatGPT, to target US financial and government…

9 months ago

GitHub Action tj-actions/changed-files was compromised in supply chain attack

The GitHub Action tj-actions/changed-files was compromised, enabling attackers to extract secrets from repositories using the CI/CD workflow. Researchers reported that…

9 months ago

New StilachiRAT uses sophisticated techniques to avoid detection

Microsoft discovered a new remote access trojan (RAT), dubbed StilachiRAT, that uses sophisticated techniques to avoid detection. In November 2024,…

9 months ago

Threat actors rapidly exploit new Apache Tomcat flaw following PoC release<gwmw style="display:none;"></gwmw>

Threat actors began exploiting a recently disclosed Apache Tomcat vulnerability immediately after the release of a PoC exploit code. A…

9 months ago

Attackers use CSS to create evasive phishing messages

Threat actors exploit Cascading Style Sheets (CSS) to bypass spam filters and detection engines, and track users’ actions and preferences. …

9 months ago

Researcher releases free GPU-Based decryptor for Linux Akira ransomware

A researcher released a free decryptor for Linux Akira ransomware, using GPU power to recover keys through brute force. Security…

9 months ago

This website uses cookies.