According to reports, India now requires data logging from all VPNs, cryptocurrency exchanges and services, VPS providers, and cloud data centre providers. The country…
General
Malware being sold on Telegram as part of the “Eternity project”
An unknown threat actor has been identified as the developer of a malware toolkit called the “Eternity Project”. The malware allows professional and amateur…
Zyxel rolls out patches for critical firewall OS command injection vulnerability
Zyxel has patched a serious flaw plaguing Zyxel firewall devices, which allows unauthenticated and remote attackers to execute code arbitrarily. “A command injection vulnerability…
Several WordPress websites were attacked; visitors were redirected to corrupt websites
Cybersecurity researchers have revealed a campaign entailing the injection of malicious JavaScript code into affected WordPress websites. The affected websites redirect visitors to fake…
Ransomware and cryptocurrency crime are the focus for a new DOJ team.
While no security officer would rely only on this, it’s encouraging to hear that the US Department of Justice is stepping up its efforts…
German companies are being targeted with malicious NPM packages
Cybersecurity researchers have found several malicious packages in the NPM registry, and these packages have been targeting big German companies to execute supply chain…
Microsoft fixes vulnerability plaguing Azure Synapse and Data Factory
On Monday, Microsoft said it patched a vulnerability plaguing Azure Synapse and Azure Data Factory. Further, Microsoft said, if the vulnerability was successfully exploited,…
A fresh perspective on “fileless” malware: Event logs carrying harmful code
Security researchers have discovered a malicious campaign that stores malware in Windows event logs, a technique that has never been publicly described for attacks…
DeFi Platform loses more than $2 million
MM. Finance revealed that hackers stole $2 million in digital assets in a Domain Namer System (DNS) attack. These attacks entail hackers targeting the…
Researchers create an RCE exploit for the latest F5 BIG-IP flaw
Security researchers are warning that they were able to construct an exploit for a serious remote code execution vulnerability affecting F5’s BIG-IP family of…