The Knauf Group has disclosed that it was the victim of a cyberattack that interfered with its business operations and compelled its worldwide IT team to shut down its IT systems in order to contain the situation. On the evening…
Latest posts - Page 50
New CloudMensis Spyware Discovered by Experts Targeting Apple macOS Users
Security experts have revealed previously unknown spyware that targets the Apple macOS operating system. The malware, known as CloudMensis by the Slovak cybersecurity company ESET, is rumoured to only use open-source cloud storage platforms like pCloud, Yandex Disk, and Dropbox…
Government of Albania Suffers “Massive Cyber-Attack”
The websites of the federal government of Albania were taken offline by a “massive cyber-attack.” The federal government claimed that the tragedy was the result of a coordinated “strike from overseas” in a statement that was distributed to local information…
Remote Code Execution is Caused via Prototype Pollution in Blitz.js.
A critical prototype pollution vulnerability in Blitz.js, a JavaScript online application framework, has been patched to prevent remote code execution (RCE) on Node.js servers. A specific kind of JavaScript flaw known as prototype pollution enables attackers to manipulate an application’s…
Password History Requirement in Windows AD to Reduce Password Reuse
Longtime advocates of password restrictions that prevent users from using their old passwords again include IT security experts. For instance, Netwrix advises configuring your password history policy to save at least the ten most recent passwords for each user. Microsoft…
Most Enterprise Vendors, According To A New Study, Are Failing To Mitigate Attacks Using Speculative Execution
In light of the fact that speculative execution assaults continue to be a vulnerability afflicting current CPUs, recent study has revealed a “industry failure” to embrace mitigations made available by AMD and Intel, creating a risk to the firmware supply…
Sality Virus Penetrates Industrial Systems Via A Password Recovery Application
A threat actor is using password “cracking” software for programmable logic controllers to infect industrial control systems (ICS) and turn them into a botnet (PLCs). The PLC and HMI (human-machine interface) terminals from Automation Direct, Omron, Siemens, Fuji Electric, Mitsubishi,…
Attackers Look For Weak Plugins on 1.6 Million WordPress Sites
Security experts have discovered a large-scale operation that searched over 1.6 million WordPress websites for the presence of a flaky plugin that permits file uploads without authentication. The Kaswara Modern WPBakery Page Builder, which was abandoned by its creator prior…
Android Security: How This New Malware Has Emerged As A Major Threat To SmartPhones
Only appearing a month ago, MaliBot has already established itself as one of the most common malware strains that targets Android users. One of the most pervasive risks to Android users has recently been a potent banking malware that was…
Brute Ratel Pentest Tool Is Added by BlackCat to Attack Arsenal
Gangs Target Big Businesses in the U.S., Europe, and Asia The Brute Ratel pentesting tool with remote access features has been added to the ransomware gang behind BlackCat’s updated arsenal. Sophos’ threat researchers claim to have been following this ransomware…