Security News

Akira and Fog ransomware now exploit critical Veeam RCE flaw
2024-10-10 22:07

Ransomware gangs now exploit a critical security vulnerability that lets attackers gain remote code execution (RCE) on vulnerable Veeam Backup & Replication (VBR) servers. [...]

Palo Alto Networks warns of firewall hijack bugs with public exploit
2024-10-09 18:59

Palo Alto Networks warned customers today to patch security vulnerabilities (with public exploit code) that can be chained to let attackers hijack PAN-OS firewalls. [...]

Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409)
2024-10-09 12:32

If you run a self-managed GitLab installation with configured SAML-based authentication and you haven’t upgraded it since mid-September, do it now, because security researchers have published an...

Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits
2024-10-08 04:07

Qualcomm has rolled out security updates to address nearly two dozen flaws spanning proprietary and open-source components, including one that has come under active exploitation in the wild. The...

Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks
2024-10-03 17:00

Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks. The cellular baseband...

Critical Ivanti RCE flaw with public exploit now used in attacks
2024-10-02 18:55

CISA warned today that a critical Ivanti vulnerability that can let threat actors gain remote code execution on vulnerable Endpoint Manager (EPM) appliances is now actively exploited in attacks. [...]

Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit
2024-10-02 12:13

Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores have been hacked by malicious actors by exploiting a security vulnerability dubbed CosmicSting. Tracked as...

Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town
2024-09-23 06:46

No malware crew linked to this latest red-teaming tool yet Attackers are using Splinter, a new post-exploitation tool, to wreak havoc in victims' IT environments after initial infiltration,...

Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware
2024-09-23 04:49

A suspected advanced persistent threat (APT) originating from China targeted a government organization in Taiwan, and possibly other countries in the Asia-Pacific (APAC) region, by exploiting a...

Hackers Exploit Default Credentials in FOUNDATION Software to Breach Construction Firms
2024-09-19 15:41

Threat actors have been observed targeting the construction sector by infiltrating the FOUNDATION Accounting Software, according to new findings from Huntress. "Attackers have been observed...