There are a few occasions in situational law where a single landmark ruling reshapes or reframes the legal environment. That is exactly what happened at the conclusion of the previous year, and everybody involved in programme growth has to take…
Latest posts - Page 32
FortiGate and FortiProxy Have a New Auth Bypass Flaw, According to Fortinet
A security weakness affecting FortiGate firewalls and FortiProxy web proxies. These proxies can allow an attacker to carry out unauthorized actions on vulnerable systems(Auth Bypass Flaw). It has been confidentially disclosed by Fortinet to its customers. The high-severity bug, identified…
A serious open source flaw WebPageTest is still not patched.
After a talk, a blog post, and public publication, the RCE exploit is still open for discussion. The maintainers of the WebPageTest project seem to be ignoring a serious remote code execution (RCE) vulnerability, despite a researcher’s best efforts at…
Police in Australia accuses a teenager of extorting Optus victims.
An alleged 19-year-old from the Sydney suburbs sent extortion SMS messages to Optus data breach victims. A juvenile threatened to blackmail victims whose data was released online in an attempt. For getting profit from the significant data breach at a…
New LilithBot malware is being offered as a service to cybercriminals by Eternity Group hackers.
LilithBot malware, has been connected to the threat actor responsible for the malware-as-a-service (MaaS) named Eternity. Researchers Shatak Jain and Aditya Sharma from Zscaler ThreatLabz stated in a paper released on Wednesday that malware has a sophisticated ability to be…
Numerous Microsoft SQL servers have been discovered to have backdoors
A backdoor that targets Microsoft SQL servers especially was recently discovered by DCSO CyTec researchers. Extended Stored Procedures, a unique class of extension utilized by Microsoft SQL servers, are how the malware operates. They scanned almost 600,000 servers throughout the…
New RatMilad Android Spyware Targeting Enterprise Devices: Experts Warn
RatMilad, a unique Android malware that masquerades as a VPN and phone number spoofing programme. It has seen to attack a Middle Eastern enterprise mobile device. According to research Zimperium published with The Hacker News, the mobile trojan performs as…
Telstra Telecom Suffers Data Breach Potentially Exposing Employee Information
Nearly two weeks after Optus reported its own incident, Australia’s largest telecoms firm Telstra disclosed that it had a data compromise via a third party. Telstra telecom data breach has occurred, according to the organization’s chief information security officer for…
PHP package manager component Packagist vulnerable to compromise
A flaw in argument injection made RCE risky SonarSource researchers discovered a vulnerability in one of Composer’s key parts that might have been exploited to attack code repositories. The primary package manager for PHP applications. Composers can find and download…
CISA Warns of Critical Atlassian Bitbucket Server Vulnerability Being Exploited by Hackers
On Friday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), citing indications of ongoing exploitation, added a previously disclosed significant vulnerability affecting Atlassian’s Bitbucket Server and Data Center to the Known Exploited Vulnerabilities (KEV) database. The problem, which has been…