The researcher says that it was theoretically conceivable to move laterally or upward beyond the instance. Jira Align vulnerabilities allow getting super admin rights. A security researcher cautions that a pair of Jira Align security flaws might, in the “worst-case…
Latest posts - Page 28
DAIXIN Team ransomware, US agencies issue warning
The DAIXIN Team, a new ransomware and data exfiltration gang that has been focusing on US healthcare, has been the subject of a joint alert from the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and…
Fortinet products have a serious authentication issue.
Customers are being urged by Fortinet to repair a serious authentication bypass flaw that has already been used in the wild. Fortinet products contain a serious authentication issue. The networking company corrected the CVE-2022-40684 vulnerability earlier this month in its…
SQLite Database Library Reported a 22-Year-Old Vulnerability
The SQLite database library has a high-severity vulnerability that was introduced as part of a code update that dates all the way back to October 2000. And might allow attackers to crash or take control of programmes. SQLite Database Library…
Cybercriminals Use Two PoS Malware to Steal Over 167,000 Credit Cards
A threat actor has used two point-of-sale (PoS) malware variants to collect details about more than 167,000 credit cards from payment terminals. Cybercriminals use two PoS malware to steal over 167,000 credit cards. Cybersecurity firm Group-IB, based in Singapore, claims…
Police in Europe apprehend a gang that used hacked wireless key fobs to steal cars
In collaboration with Spain and Latvia, French law enforcement authorities disrupted a cybercrime ring. The ring uses a hacking tool to steal cars without using a physical key fob. “The criminals targeted vehicles with keyless entry and start systems, utilizing…
“FaceStealer” iOS and Android apps steal your Facebook login information.
Meta security researchers discovered 400 malicious Android and iOS apps designed to steal user Facebook login credentials earlier this month. Facestealer is typically delivered in the form of an app disguised as a useful or entertaining tool. However, before users…
New PHP Malware Disseminated Through Cracked Microsoft Office Apps, Telegram, and Other Methods
The Zscaler ThreatLabz research team discovered a PHP (malware) version of the ‘Ducktail’ Infostealer distributed as a cracked application installer for a variety of applications such as games, Microsoft Office applications, Telegram, and others. Notably, Ducktail has been active since…
2.2M users are impacted by the MyDeal data breach, and stolen data is being sold online.
A data breach impacting 2.2 million consumers has been reported by Woolworths’ MyDeal subsidiary. The hacker was attempting to resell the stolen information on a hacker forum. Australian retail marketplace MyDeal links internet customers and nearby merchants. The world’s largest…
Hackers using the Black Basta ransomware breach networks using Qakbot to deploy Brute Ratel C4
Recent assaults were carried out by the threat actors responsible for the Black Basta ransomware family. It saw the use of the Qakbot trojan to deliver the Brute Ratel C4 framework as a second-stage payload. Security company Trend Micro stated…