Cyber Security

Common Cybercriminals Begin Critical Infrastructure Targeting

A "crimewave" of mass exploitation of Zyxel firewall devices has been washing over critical infrastructure in Europe — and Sandworm, the Russian state-sponsored...

Halara probes breach after hacker leaks data for 950,000 people

Popular athleisure clothing brand Halara is investigating a data breach after the alleged data of almost 950,000 customers was leaked on a hacking...

Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks

Jan 12, 2024NewsroomCryptocurrency / Malware Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners...

OpenAI’s New GPT Store May Carry Data Security Risks

A new kind of app store for ChatGPT may expose users to malicious bots, and legitimate ones that siphon their data to insecure,...

How are sock puppet accounts used in OSINT?

Business Security How wearing a ‘sock puppet’ can aid the collection of...

Over 150k WordPress sites at takeover risk via vulnerable plugin

Two vulnerabilities impacting the POST SMTP Mailer WordPress plugin, an email delivery tool used by 300,000 websites, could help attackers take complete control of...

CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability

Jan 12, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability impacting Microsoft SharePoint Server...

Volt Typhoon Ramps Up Malicious Activity Against Critical Infrastructure

China-backed cyber espionage group Volt Typhoon is systematically targeting legacy Cisco devices in a sophisticated and stealthy campaign to grow its attack infrastructure.In...

Latest articles