Security researchers from Guardio Labs uncovered a significant oversight in Opera’s web browser for Windows and macOS, which allows cybercriminals to launch any file, including malicious ones, on the computer’s base operating system. The...
Nearly three months after a substantial cyberattack on the British Library, its representatives have announced the commencement of restoration efforts for the main online catalog, encompassing 36 million records of books, maps, journals, and...
According to a report by SecurityScorecard’s STRIKE team, hackers from the Volt Typhoon group, linked to the Chinese government, have gained persistent access to Cisco RV320/325 routers, discontinued since 2019. The malefactors exploited two...
Bitdefender has identified a vulnerability in the popular Bosch BCC100 Wi-Fi thermostat model. This flaw permits cybercriminals to remotely manipulate device settings, including temperature, and install malicious software. Internet of Things (IoT) devices, ranging...
A 29-year-old Ukrainian hacker was arrested last weekend for compromising a large number of accounts to create virtual machines and mine $2 million worth of cryptocurrency. According to the European Union’s law enforcement agency...
Popular mobile messaging apps such as WhatsApp, Signal, and Telegram have long been targets for cybercriminals. Scammers create and distribute malicious replicas of these applications, deceiving users with phishing campaigns on social media, email,...
Specialists at VulnCheck have developed a Proof-of-Concept (PoC) code that exploits a recently discovered critical vulnerability in the Apache OFBiz Enterprise Resource Planning (ERP) system to execute malicious code in memory. The vulnerability, designated...
A hacker group called Cyber Toufan, allegedly backed by the Palestinian state, claims to have hacked over 100 Israeli organizations through data deletion and theft operations. This is part of a comprehensive attack campaign...
Cybersecurity researchers have identified a new type of attack that exploits weaknesses in the configuration of Apache’s Hadoop and Flink software, deploying cryptocurrency miners on target systems. “This attack is particularly intriguing due to...
A suspect in organizing a multimillion-dollar cryptojacking scheme was arrested following an extensive investigation conducted by Europol with the support of the National Police of Ukraine. A 29-year-old Ukrainian national was apprehended this week...
At least five different types of malware have been employed by suspected state-sponsored hackers to gain access to company networks through Zero-Day vulnerabilities in Ivanti Connect Secure (ICS) VPN devices. These attacks have been...
The United States Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw affecting Microsoft SharePoint Server to its catalog of Known Exploited Vulnerabilities (KEV). This decision was based on evidence of...
The National Cyber Security Centre of Finland (NCSC-FI) is issuing a warning about the increased activity of the Akira ransomware. According to the center, this past December witnessed hackers successfully carrying out six of...
Victims of the ransomware Royal and Akira fell prey to an imposter posing as a cybersecurity researcher. The malefactor promised to hack into the servers of the original attackers and erase the stolen data....
Adobe has released a crucial security update that rectifies six vulnerabilities in its Substance 3D Stager product. If exploited successfully, these vulnerabilities could lead to memory leaks and arbitrary code execution. Substance 3D Stager...
Recently, a 22-year-old French citizen was sentenced to three years in prison for his involvement with the hacker group ShinyHunters. Sébastien Raoult, better known as Sezyo Kaizen, was extradited to the United States in...