Security News

Chinese hackers breached Dutch Ministry of Defense
2024-02-07 14:31

Chinese state-sponsored hackers have breached the Dutch Ministry of Defense last year and deployed a new remote access trojan malware to serve as a backdoor. "The effects of the intrusion were limited because the victim network was segmented from the wider MOD networks," the Dutch Military Intelligence and Security Service and the General Intelligence and Security Service noted.

Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network
2024-02-07 06:29

Chinese state-backed hackers broke into a computer network that's used by the Dutch armed forces by targeting Fortinet FortiGate devices. "This [computer network] was used for unclassified...

Chinese hackers infect Dutch military network with malware
2024-02-06 18:49

A Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices, according to the Military Intelligence and Security Service of the Netherlands. During the follow-up investigation, a previously unknown malware strain named Coathanger, a remote access trojan designed to infect Fortigate network security appliances, was also discovered on the breached network.

Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data
2024-02-06 10:14

Employment agencies and retail companies chiefly located in the Asia-Pacific (APAC) region have been targeted by a previously undocumented threat actor known as ResumeLooters since early 2023 with...

Hackers steal data of 2 million in SQL injection, XSS attacks
2024-02-06 07:00

A threat group named 'ResumeLooters' has stolen the personal data of over two million job seekers after compromising 65 legitimate job listing and retail sites using SQL injection and cross-site scripting attacks. ResumeLooters primarily employs SQL injection and XSS to breach targeted sites, mainly job-seeking and retail shops.

Leaky Vessels flaws allow hackers to escape Docker, runc containers
2024-02-04 15:17

Four vulnerabilities collectively called "Leaky Vessels" allow hackers to escape containers and access data on the underlying host operating system. Containers are applications packaged into a file that contains all the runtime dependencies, executables, and code required to run an application.

Mastodon Vulnerability Allows Hackers to Hijack Any Decentralized Account
2024-02-03 06:51

The decentralized social network Mastodon has disclosed a critical security flaw that enables malicious actors to impersonate and take over any account. "Due to insufficient origin validation in...

AnyDesk says hackers breached its production servers, reset passwords
2024-02-02 22:16

AnyDesk confirmed today that it suffered a recent cyberattack that allowed hackers to gain access to the company's production systems. In a statement shared with BleepingComputer late Friday afternoon, AnyDesk says they first learned of the attack after detecting indications of an incident on their product servers.

AnyDesk says hackers breached its production servers, resets passwords
2024-02-02 22:16

AnyDesk confirmed today that it suffered a recent cyberattack that allowed hackers to gain access to the company's production systems. In a statement shared with BleepingComputer, AnyDesk says they first learned of the attack after detecting indications of an incident on their product servers.

Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks
2024-02-02 14:49

Russian state-sponsored actors have staged NT LAN Manager (NTLM) v2 hash relay attacks through various methods from April 2022 to November 2023, targeting high-value targets worldwide. The...