In order to divert visitors to phoney Q&A discussion boards, hackers have compromised around 15,000 websites with huge black hat SEO campaigns (Google SEO poisoning campaign). Sucuri, who claims that each compromised site has about 20,000 files used in the…
Latest posts - Page 26
Iranian Threats to the Healthcare Sector: Federal Authorities
Tehran hackers close the sophistication gap with social engineering The federal government cautions the healthcare industry to be on the lookout for Iranian threat actors disguising themselves as doctors, think tank researchers, or journalists. Tehran-backed hackers frequently use social engineering…
Numerous Cyber Attacks Using IPFS Decentralized Network Seen
The decentralized Interplanetary Filesystem (IPFS) network is being used by a variety of phishing attempts to host malware, phishing kit infrastructure, and support other attacks. According to data released with The Hacker News by Cisco Talos researcher Edmund Brumaghin. Hosting…
Users Can Unshare Their Email or Phone Number on Facebook Using This Secret Tool
Facebook appears to have quietly introduced a feature that lets users delete other people’s contact information. This includes phone numbers and email addresses. Business Insider broke the news of the tool’s existence last week. It is hidden inside a Help…
After a ransomware hack exposed 9.7 million customers, Medibank refuses to pay the ransom.
Following a ransomware hack, Australian health insurer Medibank acknowledged that access to the personal information of roughly 9.7 million of its current and former clients was made possible. The company claims that the attack was discovered on October 12. In…
SocGholish diversifies and expands its malware staging infrastructure.
Threat actors have been using the JavaScript-based framework SocGholish since 2017 to obtain initial access to computers. To infect systems, SocGholish employs social engineering. It deceives users into running a malicious JavaScript payload that poses as a necessary system or…
FBI: Hacktivist DDoS attacks had a minimal effect on important organizations
According to the Federal Bureau of Investigation (FBI), organized hacktivist organizations’ distributed denial-of-service (DDoS) operations. But the distributed DDoS has a negligible effect on their target systems. This occurs because law enforcement targets public-facing infrastructure like websites rather than the…
Microsoft was prosecuted for open-source theft via GitHub Copilot.
Programmer and attorney Matthew Butterick have filed lawsuits against Microsoft, GitHub, and OpenAI. He argued that GitHub Copilot infringes on programmers’ rights and breaches the provisions of open-source licenses. In June 2022, GitHub Copilot, an AI-based programming tool, will be…
Checkmk IT infrastructure monitoring software has Vulnerabilities
The Checkmk IT Infrastructure monitoring software has vulnerabilities that have been publicly revealed and could be exploited by a remote, unauthenticated attacker to completely take control of the vulnerable systems. Stefan Schiller, a SonarSource researcher, wrote in a technical study.…
Critical “CosMiss” RCE Flaw Affecting Azure Cosmos DB
On Tuesday, Microsoft said that it has fixed a CosMiss RCE flaw that allows complete read and write access in Jupyter Notebooks for Azure Cosmos DB. IT giant claimed that the issue was first identified CosMiss RCE flaw on August…