General Security News
-
Twitter Denies Hacking Claims, Assures Leaked User Data Not from its System
Twitter on Wednesday said that its investigation found "no evidence" that users' data sold online was obtained by exploiting any security...
-
Alert: Hackers Actively Exploiting Critical "Control Web Panel" RCE Vulnerability
Malicious actors are actively attempting to exploit a recently patched critical vulnerability in Control Web Panel (CWP) that enables elevated...
-
New Analysis Reveals Raspberry Robin Can be Repurposed by Other Threat Actors
A new analysis of Raspberry Robin's attack infrastructure has revealed that it's possible for other threat actors to repurpose the infections for...
-
Hackers Use Text-to-SQL Attacks to Break into Your Databases
Recently, a group of researchers successfully demonstrated a new type of attack that utilizes Text-to-SQL models in order to generate malicious...
-
Microsoft Details Techniques Used by Hackers to Deliver Ransomware to macOS Devices
One of the most dominating threats in the current cyberspace era is ransomware which is constantly affecting organizations of all sizes. In order...
-
Microsoft Issues January 2023 Patch Tuesday Updates, Warns of Zero-Day Exploit
The first Patch Tuesday fixes shipped by Microsoft for 2023 have addressed a total of 98 security flaws, including one bug that the company said is...
-
StrongPity Hackers Distribute Trojanized Telegram App to Target Android Users
The advanced persistent threat (APT) group known as StrongPity has targeted Android users with a trojanized version of the Telegram app through a...
-
Expert Analysis Reveals Cryptographic Weaknesses in Threema Messaging App
A comprehensive analysis of the cryptographic protocols used in the Swiss encrypted messaging application Threema has revealed a number of...
-
Kinsing Crypto Malware Hits Kubernetes Clusters via Misconfigured PostgreSQL
The threat actors behind the Kinsing cryptojacking operation have been spotted exploiting misconfigured and exposed PostgreSQL servers to obtain...
-
New Study Uncovers Text-to-SQL Model Vulnerabilities Allowing Data Theft and DoS Attacks
A group of academics has demonstrated novel attacks that leverage Text-to-SQL models to produce malicious code that could enable adversaries to...
-
Why Do User Permissions Matter for SaaS Security?
Earlier this year, threat actors infiltrated Mailchimp, the popular SaaS email marketing platform. They viewed over 300 Mailchimp customer accounts...
-
Dridex Malware Targeting macOS Platform Using New Entry Method
By using email attachments that resemble regular documents, a variant of Dridex (aka Bugat and Cridex), which is a banking malware is spreading to...