IT Information Security

AttachMe: a critical flaw affects Oracle Cloud Infrastructure (OCI)

A critical vulnerability in Oracle Cloud Infrastructure (OCI) could be exploited to access the virtual disks of other Oracle customers.…

3 years ago

A 15-Year-Old Unpatched Python bug potentially impacts over 350,000 projects

More than 350,000 open source projects can be potentially affected by a 15-Year-Old unpatched Python vulnerability More than 350,000 open…

3 years ago

Atlassian Confluence bug CVE-2022-26134 exploited in cryptocurrency mining campaign

Threat actors are targeting unpatched Atlassian Confluence servers as part of an ongoing crypto mining campaign. Trend Micro researchers warn…

3 years ago

A disgruntled developer is the alleged source of the leak of the Lockbit 3.0 builder

A disgruntled developer seems to be responsible for the leak of the builder for the latest encryptor of the LockBit…

3 years ago

Over 39K unauthenticated Redis services on the internet targeted in cryptocurrency campaign

Threat actors targeted tens thousands of unauthenticated Redis servers exposed on the internet as part of a cryptocurrency campaign. Redis,…

3 years ago

Hackers stole $160 Million from Crypto market maker Wintermute

Threat actors have stolen around $160 million worth of digital assets worth from crypto trading firm Wintermute. Malicious actors continue to…

3 years ago

U.S. gov adds more Chinese Telecom firms to the Covered List

The U.S. Federal Communications Commission (FCC) has added more Chinese telecom firms to the Covered List. The U.S. Federal Communications…

3 years ago

Imperva blocked a record DDoS attack with 25.3 billion requests

Cybersecurity company Imperva announced to have mitigated a distributed denial-of-service (DDoS) attack with a total of over 25.3 billion requests.…

3 years ago

Uber believes that the LAPSUS$ gang is behind the recent attack

Uber disclosed additional details about the security breach, the company blames a threat actor allegedly affiliated with the LAPSUS$ hacking…

3 years ago

Analyzing IP Addresses to Prevent Fraud for Enterprises

How can businesses protect themselves from fraudulent activities by examining IP addresses? The police would track burglars if they left…

3 years ago

This website uses cookies.