A critical security vulnerability in the Amazon ECR (Elastic Container Registry) Public Exhibition could have enabled assailants to deactivate any container image or inject malware into images from other AWS accounts. The Amazon ECR Public Gallery is a general populace…
Latest posts - Page 23
Log4j vulnerability is still active a year later.
Amidst mitigation, Log4j one of the worst internet bugs in history is still being exploited. The Apache Software Foundation revealed a vulnerability, sending the global tech industry into a frenzy. The bug, identified as Log4Shell, was in the pervasive open-source…
TrueBot malware is utilized by Clop ransomware to acquire network access.
Security specialists have noticed an expansion in the quantity of hardware tainted with TrueBot malware downloader created by Quietness, a Russian-talking hacking bunch. The Quietness bunch is notable for massive scope heists against monetary establishments. It all started to create…
AIIMS Delhi services are disrupted by a cyberattack: patient data is at risk
At AIIMS Delhi cyberattack, routine tasks including scheduling appointments, registering patients, paying, and producing lab reports have all been halted by the cyberattack. According to an agency, no precautions were taken by the computer department to protect the network after…
Google Issues a Warning Regarding a ScarCruft Hacker-Used Zero-Day Vulnerability in Internet Explorer
An Internet Explorer zero-day flaw was actively exploited by a North Korean malicious attacker to target South Korean consumers by relying on the current Itaewon Halloween crowd crush to deceive victims into downloading malware. The current round of attacks by…
CloudSEK claims another cybersecurity firm hacked it
According to Indian cybersecurity company CloudSEK, a threat actor used passwords for one of its staff’ Jira accounts to access its Confluence server. While some internal data from its Confluence wiki was stolen, comprising images of the product dashboard and…
Attackers using the Vice Society ransomware specifically targeted schools in 2022.
With 33 victims in 2022, the Vice Society cybercrime organization outperformed other malware groups like LockBit, BlackCat, BianLian, and Hive in its preference for educational institutions. Health, government, industrial, retail, and legal support are some other well-known industry verticals that…
2,000,000 Android malware applications have been found on Google Play.
More than 2,000,000 people have been tricked into installing new Android malware, phishing, and adware applications that have entered the Google Play store. The projects, which have all the earmarks of being useful utilities and framework enhancers yet are the…
Cuba ransomware alert from CISA and the FBI
The CISA and the FBI have delivered a joint CSA (joint Cybersecurity Advisory) on the ransomware known as “Cuba ransomware” as a component of the latest #StopRansomware mission to scatter ransomware data for network safeguards. Despite being designated “Cuba,” the…
Powerless tailscale VPN hubs to DNS rebinding and RCE
The latest adaptation ought to now be physically refreshed by clients. Refreshed An open-source network Tailscale VPN program contains various bugs that could allow assailants to send off remote code execution (RCE) assaults on VPN hubs. Tailscale is dependent on…