Syslogk, a new Linux rootkit malware that uses specially designed “magic packets” to awaken a dormant backdoor on the system, is being utilised in…
General
Botnet targeting Linux servers
A recent Golang-based peer-to-peer (P2P) botnet has been targeting Linux servers in the education sector since it emerged in March 2022. Akami Security Research…
Kaiser Permanente hit by data breach; 70,000 patients’ data exposed
The Health and personal data of around 70,000 Kaiser Permanente patients in Washington state have been stolen as hackers accessed the U.S. healthcare giant’s…
Vulnerabilities in Fujitsu Cloud Storage Could Allow Attackers To Access Backups
Unauthorized attackers were able to access backups thanks to serious security flaws in Fujitsu’s cloud storage infrastructure. The flaw specifically affected the FUJITSU ETERNUS…
Apple M1 CPUs have a new flaw that can’t be patched, according to MIT researchers
A new hardware attack known as PACMAN has been shown against Apple’s M1 processor chipsets, potentially allowing a destructive actor to get arbitrary code…
Vulnerabilities plaguing Mitel IP phones
Cybersecurity researchers have shared details of two medium-security vulnerabilities in Mitel 6800/6900 desk phones, and if the vulnerabilities are successfully exploited, the attackers can…
AvosLocker and Cerber2021 ransomware were installed on Confluence servers
For first access to corporate networks, ransomware gangs are now targeting a newly patched and actively exploited remote code execution (RCE) vulnerability affecting Atlassian…
Researchers identify flaws in Carrier’s Industrial Access Control System
At least 8 vulnerabilities have been discovered in Carrier’s LenelS2 HID Mercury access control system; The system is prevalent in healthcare, education, transportation and…
A large-scale Facebook accounts phishing attack was uncovered by PIXM
As phishing attempts continue to be a popular target for cybercriminals, one scam discovered that a user had acquired a million Facebook account credentials…
Onapsis Research Labs has discovered three actively exploited SAP vulnerabilities
The Onapsis Research Labs keep a close eye on the changing threat landscape in order to better understand how commercial software like SAP and…