According to recent data from cybersecurity firm Akamai, researchers have uncovered a new botnet, based on the infamous Mirai malware, named “InfectedSlurs”. This malicious infrastructure employs two zero-day vulnerabilities, effortlessly infecting routers and digital...
North Korean hackers infiltrated Taiwanese company CyberLink, a renowned multimedia software producer. The malefactors embedded malicious code into one of CyberLink’s installers distributed through official update channels. This breach led to the infection of...
ownCloud, a popular open-source file sync and share solution, has been found to harbor three critical vulnerabilities that could expose sensitive user data and compromise system security. These vulnerabilities tracked as CVE-2023-49103, CVE-2023-49104, and...
strongSwan, a widely used open-source implementation of IPsec (Internet Key Exchange Protocol), has been found to harbor a critical buffer overflow vulnerability (CVE-2023-41913) that could potentially lead to remote code execution. This vulnerability affects...
The latest research by Check Point has unveiled significant shifts in the cyber threat landscape, where experts have observed a marked increase in ransomware attacks targeting Linux systems, particularly ESXi, compared to the traditionally...
In the cybercriminal domain, a new variant of ransomware named QazLocker is gaining momentum. It’s being used in a multitude of attacks to target companies across various business sectors in different countries. However, there’s...
The French organization SIAAP, responsible for wastewater treatment for nine million residents of Paris and its surroundings, fell victim to a substantial cyberattack on Friday. The company manages nearly 450 kilometers of pipelines across...
In recent security news, two researchers, Thomas Chauchefoin and Paul Gerste from SonarSource, have disclosed technical details for a critical Visual Studio Code remote code execution vulnerability and shared a public proof-of-concept (PoC) exploit....
On November 19, the team at market maker Kronos Research encountered a significant issue: a leakage of their API keys resulted in the loss of approximately $26 million in cryptocurrencies. Kronos Research initiated an...
On Sunday, the hacker group SiegedSec, known for their politically motivated attacks, claimed on Telegram to have breached the personnel management application of the Idaho National Laboratory. The group alleges that it accessed detailed...
In the realm of machine learning, Apache Submarine has emerged as a prominent End-to-End Machine Learning Platform, empowering data scientists to seamlessly create and manage machine learning workflows. This versatile platform caters to the...
Atlassian has recently disclosed a critical vulnerability affecting the Bamboo Data Center and Server. This vulnerability, classified as CVE-2023-22516, allows an authenticated attacker to execute arbitrary code on the affected system, posing a severe...
Atomic Stealer, also known as AMOS, is a popular stealer for Mac OS. In September, security researchers from Malwarebytes described how malicious ads were tricking victims into downloading this piece of malware under the...
A critical vulnerability dubbed Looney Tunables in the GNU C library (glibc), a core component of Linux-based systems, has been added to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV)...
Synology, a leading provider of network-attached storage (NAS) and surveillance solutions, has issued a security advisory to address a high-severity vulnerability affecting Synology Router Manager (SRM). This vulnerability, discovered during the PWN2OWN 2023 security...
GIMP, the GNU Image Manipulation Program, is a widely used open-source image editing software that has gained immense popularity among graphic designers and enthusiasts. However, recent discoveries have revealed four critical security vulnerabilities that...