General Security News
-
Developers Beware: Malicious Rust Libraries Caught Transmitting OS Info to Telegram Channel
In yet another sign that developers continue to be targets of software supply chain attacks, a number of malicious packages have been discovered on...
-
Cisco Nexus 3000 and 9000 Series Switches Flaw Let Attackers Trigger DoS Attack
A Denial-of-Service vulnerability has been discovered in the Cisco Nexus 3000 and 9000 series switches, which could allow a threat actor to cause...
-
Cisco NX-OS Software Flaw Let Attacker Trigger a DoS Attack
A high-severity vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software might allow an unauthenticated local attacker...
-
Cloud Hosting Provider Lost all Customer Data Following Ransomware Attack
There has been a cyber attack on two cloud hosting providers, namely CloudNordic and Azero Cloud, which Certiqa Holding owns. The cyberattack has...
-
KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced Capabilities
An updated version of a botnet malware called KmsdBot is now targeting Internet of Things (IoT) devices, simultaneously branching out its...
-
LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants
The leak of the LockBit 3.0 ransomware builder last year has led to threat actors abusing the tool to spawn new variants. Russian cybersecurity...
-
Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack
Risk and financial advisory solutions provider Kroll on Friday disclosed that one of its employees fell victim to a "highly sophisticated" SIM...
-
Wireshark 4.0.8 Release: What’s New!
The most widely used network protocol analyzer in the world, Wireshark, has released version 4.0.8. It is employed for network analysis,...
-
What are Brute Force Attacks, and How to Protect Your APIs Against them?
Brute force attacks have been one of the most common attack types. In Q1 2022, brute force made up 51% of all attacks! These attacks often pave...
-
Simplify Secure Enterprise Device Management With QR Codes
Corporate mobile devices have become essential to everyday tasks for employees, but this convenience also comes with security risks. The challenge...
-
Lazarus Group Exploits Critical Zoho ManageEngine Flaw to Deploy Stealthy QuiteRAT Malware
The North Korea-linked threat actor known as Lazarus Group has been observed exploiting a now-patched critical security flaw impacting Zoho...
-
New Telegram Bot "Telekopye" Powering Large-scale Phishing Scams from Russia
A new financially motivated operation is leveraging a malicious Telegram bot to help threat actors scam their victims. Dubbed Telekopye, a...