Over the last three weeks, more than 3,900 WordPress sites have been targeted in a new malicious campaign aimed at exploiting a vulnerability in the Popup Builder plugin to inject harmful JavaScript content into...
In the realm of cybersecurity, a critical vulnerability has been discovered affecting Progress Software products, specifically the OpenEdge Authentication Gateway and AdminServer. This flaw poses a significant threat to authentication mechanisms, potentially allowing malefactors...
Several French governmental organizations have experienced cyberattacks of unprecedented intensity, as reported by the country’s Prime Minister’s office on March 11th. These attacks commenced on the evening of March 10th, and while their exact...
A new study by the University of Chicago has uncovered a vulnerability within the Meta Quest VR system that allows malefactors to hijack user devices, pilfer confidential information, and manipulate social interactions using generative...
GuidePoint Security, a cybersecurity firm, has uncovered that the BianLian group is exploiting vulnerabilities in the JetBrains TeamCity software to carry out ransomware attacks. Experts have documented a sequence of attacks initiated through the...
Microsoft has unveiled a new feature for DirectX 12, dubbed Work Graphs, which has been available in a preview release for some time. Work Graphs aim to enhance the efficiency of GPU-driven rendering, thereby...
Microsoft has announced the cessation of support for the Enterprise and Education editions of Windows 10 21H2 on June 10, 2024. Beyond this date, operating systems running these versions will no longer receive technical...
Moxa expressed its gratitude to the experts at Positive Technologies for identifying a dangerous vulnerability in the NPort series of wireless industrial converters. Classified as CVE-2024-1220, this vulnerability was rated as high risk with...
The group known as Magnet Goblin has been actively exploiting vulnerabilities in publicly accessible servers to deploy malware on Windows and Linux systems. This group focuses on exploiting 1-day vulnerabilities—security flaws that have been...
A critical vulnerability in Fortinet’s security systems has impacted approximately 150,000 devices worldwide. The vulnerability, CVE-2024-21762 (CVSS score: 9.8), is characterized as an out-of-bounds write issue in FortiOS, enabling an unauthenticated attacker to execute...
Cyberattacks have compelled many organizations to learn multiple strategies that can prevent potential and current attacks. This has seen an eruption of theories, policies and systems that help enhance data security and keep sensitive...
In a recent interview with IGN, Peter Moore, a former executive at Xbox and EA, delved into the current market dynamics of the console gaming industry and offered insights into its future trajectory. Moore,...
A report by the leading company Proofpoint has unveiled a sophisticated cyber fraud scheme orchestrated by the hacker group TA4903. This gang specializes in Business Email Compromise (BEC) attacks and has, over the past...
In recent times, cybercriminals have intensified their assaults on WordPress-based sites, employing a cunning method of infection. Sucuri, a company specializing in web security, has uncovered a new campaign aimed at script injection. Previously,...
Cybereason has identified a new malware variant named Snake, which proliferates through Facebook messages. This Python-written infostealer is designed to pilfer confidential user data. The stolen data are transmitted across various platforms, including Discord,...
Recently, cybersecurity experts worldwide have observed an uptick in hacker attacks targeting improperly configured cloud servers running on Apache Hadoop, Docker, Confluence, and Redis. In one of these recent attacks, malefactors deployed a novel...