The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified security vulnerabilities in the JasperReports product from TIBCO Software that is two years old and has been added to its list of Known Exploited Vulnerabilities (KEV). This means that these vulnerabilities…
Latest posts - Page 23
Brazilian Banking Users: Cyber attackers Unveil BrasDex Android Trojan
The threat actors responsible for the Windows financial services malware Casbaneiro have been linked to a new Android trojan known as BrasDex. BrasDex has been witnessed in targeting Brazilian consumers as a part of a multi-platform campaign. According to ThreatFabric,…
The FBI has issued a warning that BEC attacks are now targeting food shipments
According to joint advisory issuance by several U.S. federal agencies, organizations in the food industry are now being aimed in company email compromise (BEC) attacks aimed at stealing entire shipments of food. The FBI has issued a warning that BEC…
Uber data was stolen through a third-party vendor.
Uber is confronted with a new cybersecurity incident after malicious actors stole a portion of its data from Teqtivity, a 3rd vendor that offers resource planning and monitoring services. “We are aware that our customer data has been compromised as…
New GoTrim Botnet Attempts to Gain Access to WordPress Site Admin Accounts
A new Go-based botnet has been discovered scanning and brute-forcing self-hosted internet sites powered by WordPress content management systems (CMS) in order to gain control of targeted systems. New GoTrim Botnet Attempts to Gain Access to WordPress Site Admin Accounts.…
A hacker allegedly breaches the US FBI Cybersecurity Forum
A phoney CEO who stole emails was ushered into a seat at InfraGard by the Bureau. A hacker posing as the CEO of an American financial institution allegedly used a fake email address to gain bureau-approved access to the FBI…
The flaws in Amazon ECR Public Gallery
A critical security vulnerability in the Amazon ECR (Elastic Container Registry) Public Exhibition could have enabled assailants to deactivate any container image or inject malware into images from other AWS accounts. The Amazon ECR Public Gallery is a general populace…
Log4j vulnerability is still active a year later.
Amidst mitigation, Log4j one of the worst internet bugs in history is still being exploited. The Apache Software Foundation revealed a vulnerability, sending the global tech industry into a frenzy. The bug, identified as Log4Shell, was in the pervasive open-source…
TrueBot malware is utilized by Clop ransomware to acquire network access.
Security specialists have noticed an expansion in the quantity of hardware tainted with TrueBot malware downloader created by Quietness, a Russian-talking hacking bunch. The Quietness bunch is notable for massive scope heists against monetary establishments. It all started to create…
AIIMS Delhi services are disrupted by a cyberattack: patient data is at risk
At AIIMS Delhi cyberattack, routine tasks including scheduling appointments, registering patients, paying, and producing lab reports have all been halted by the cyberattack. According to an agency, no precautions were taken by the computer department to protect the network after…