The problem still has to be fixed, although there are solutions available. Pebble, a Java templating engine, had a weakness that might let attackers get beyond its security safeguards. Framework Pebble vulnerable can launch command injection attacks against host servers.…
Latest posts - Page 34
Various sectors’ search engine users are directed to JavaScript malware via SEO poisoning campaigns
The clever operation directs people looking for business templates and forms to websites that are hosting dangerous files. Researchers have found a high-effort SEO poisoning campaign involves workers in various business and governmental sectors. They look up specific terms related…
The Colonial Pipeline ransomware organization has adopted new strategies to increase its danger
According to Symantec, the organization, known as Coreid, has updated its data exfiltration tool and is now providing more sophisticated capabilities to successful affiliates. When Colonial Pipeline ransomware, a firm in charge of distributing oil and gas over the East…
Optus Facing $1 Million Threat of Extortion Following Data Breach
A US$1 million extortion demand has been made against the second-largest telecommunications provider in Australia in an effort to stop the sale of potentially 11.2 million sensitive client details, according to the attacker. The Australian Federal Police is looking into…
17-Year-Old Hacker Detained by London Police After GTA 6 and Uber Breaches
On Friday, the City of London Police announced that a 17-year-old Oxfordshire kid had been detained on suspicion of hacking after GTA 6 and uber breaches. According to the report, the City of London Police detained a 17-year-old in Oxfordshire…
More TAP Air Portugal data leaks from a hacker group are posted, affecting 1.5 million customers and corporate data.
TAP Air Portugal data leaks by a gang going by the name Ragnar Locker in late August. The firm reportedly declined to help the attackers, leading to a larger release this week. Initially, the group made available about 115,000 client…
Attacks on Android-using bank customers by a Trojan masquerading as an IT refund
In order to obtain financial information, such as account numbers, IFS codes, CIF numbers, debit card numbers, expiration dates, CVV, and PINs, phishing scams pose as income tax refunds. They can obtain full names, PANs, Aadhaar numbers, addresses, dates of…
Twitter User Accounts Exposed by Password Reset Bug
Twitter recently fixed a problem that permitted accounts to remain logged-in on numerous devices even after a voluntarily changed password. The social network business addressed the password reset bug in a recent update. Twitter allowed users who changed their passwords…
Researchers Discover a New Metador APT that Targets Universities, ISPs, and Telcos
Attacks on colleges, telecom companies, and internet service providers have been attributed to an unidentified threat actor. The threat actor with a history of operating in the Middle East and Africa. In a recent analysis, researchers from SentinelOne claimed that…
Critical Vulnerability in Oracle Cloud Infrastructure Revealed by Researchers
A new, serious Oracle Cloud Infrastructure (OCI) vulnerability has been revealed that users could utilize to get access to the virtual discs of other Oracle clients. Shir Tamari, chief of research at Wiz, stated in a series of tweets that…