Recently, Portswigger researchers discovered new techniques for framing a website without using the iframe element when researching XSS vectors. To include these, PortSwigger has updated the XSS cheat sheet. Researchers at Portswigger found that Google Chrome permits changing the URL…
Latest posts - Page 48
Untangling KNOTWEED: A private European Offensive Actor Employing 0-Day Exploits
A private-sector offensive actor (PSOA) was discovered by the Microsoft Threat Intelligence Center (MSTIC) and the Microsoft Security Response Center (MSRC) using a number of Windows and Adobe 0-day exploits, including one for the recently patched CVE-2022-22047, in limited and…
The CISA Director Warns That Ransomware Hackers Will Continue To Target Smaller Critical Infrastructure
Brandon Wales, the executive director of CISA, spoke on how ransomware perpetrators target businesses of all sizes and how CISA wants firms to stop zero-day incidents. Federal agencies have increased their efforts to thwart future assaults on the country’s vital…
4 Steps the Financial Industry Can Take to Cope with Their Growing Attack Surface
The financial services sector has long been at the forefront of technology adoption, but the 2020 pandemic has hastened the adoption of chat-based customer service, mobile banking apps, and other technological advancements. According to Adobe’s 2022 FIS Trends Report, the…
Experts Discover Similarities Between BlackMatter Ransomware and New LockBit 3.0
The most recent version of the LockBit ransomware shares characteristics with BlackMatter, a renamed form of the DarkSide ransomware strain that went out of business in November 2021, according to cybersecurity analysts. In addition to the first ransomware bug bounty…
Grails Have A Serious Security Flaw That Could Allow Remote Code Execution
The open-source web app framework’s maintainers advise patching all versions, even those that are not thought to be susceptible. A significant security flaw has been identified by AntGroup FG Security Lab researchers that enables remote code execution within Grail’s application…
How Cybercriminals Install Malware Programmes via Chat Apps
Automation tools are popular among users on messaging services like Telegram and Discord. Users that engage in cybercrime are among them. Message-sending programmes have gained a lot of popularity in part because of features that go beyond simply sending messages…
IT Systems Were Compromised, According To Policybazaar, But No Critical Consumer Data Was Disclosed
The company stated in a notification to exchanges that the detected vulnerabilities in Policybazaar’s IT systems have been resolved and a thorough examination of the systems has been started. The IT systems of the insurance brokerage site were compromised on…
Business Networks Were Vulnerable To Misuse Because Of Zyxel Firewall Flaws
The severity of the code execution bug was reduced by the prior patch’s “high uptake.” Following the identification of two security flaws that exposed corporate networks to exploitation, Zyxel has published updates for a number of its firewall devices. The…
Ransomware Attacks on Kaseya VSA; REvil Group Linked to Attack
NOT JUST STATE ACTORS USING SUPPLY CHAIN ATTACKS! guys, that’s correct! The infamous SolarWinds hacks, which took place in late 2020 and were only detected in early 2021, thrust supply chain compromise squarely in the spotlight. Eventually, the relentless cadence…