According to a security researcher, an unpatched vulnerability in PayPal’s money transfer service could allow attackers to deceive victims into completing attacker-directed transactions with a single click. Clickjacking, also known as UI redressing, is a method of tricking an unwary…
Latest posts - Page 59
The Snake Keylogger is spread via malicious PDFs.
The email campaign also made use of Microsoft Word, which exploited a 22-year-old Office RCE flaw. While most malicious e-mail campaigns employ Word documents to disguise and spread malware, researchers have uncovered that a recently discovered campaign combines a malicious…
Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover
More than 90,000 websites are affected by the privilege escalation bug discovered in the Jupiter and JupiterX Core Plugin. According to scientists, a significant privilege escalation problem discovered in two themes used by over 90,000 WordPress web pages can allow…
IBM helps schools across the globe to build strong cybersecurity defenses
IBM has extended a program that improves cybersecurity defenses of public schools with$5 million in grants. On Tuesday, IBM announced that it would offer a $5 million grant to public schools, including K-12 institutions in the United States. IBM’s existing…
When Ransomware Attacks, How Do You Protect Your Data?
Ransomware is not a novel type of attack. Indeed, the first malware surfaced almost 30 years ago and was delivered using 5.25-inch floppy discs. The victim had to send money to a P.O. Box in Panama to pay the ransom.…
What Is the Risk of a Cyber Attack on Transportation?
If an attacker gains access to a transit agency’s networks, the consequences might be considerably more serious than server outages or exposed emails. Consider an attack on a transportation agency in charge of railway and subway routes. The consequences could…
An unpatched flaw can result in attackers stealing from PayPal users
A security researcher asserts that he has uncovered an unpatched flaw in PayPal’s money transfer service. The flaw can allow attackers to deceive victims into inadvertently completing attacker-directed transactions with a single click. Clickjacking, also goes by the name UI…
Microsoft’s report tracks a 254% surge in XorDdos Malware
XorDdos, a Linux botnet malware, has been used extensively—a 254% increase—in the last six months, a Microsoft research reports. The trojan derives its name from its denial-of-service attacks on Linux; it uses XOR-based encryption for communicating with its command-and-control (C2)…
Google’s OAuth client library for Java had a major flaw
Last month Google patched a severe flaw in its OAuth client library for Java; the actors can exploit the flaw by using a compromised token to plant arbitrary payloads. The flaw, tracked CVE-2021-22573 and rated 8.7 out of 10 on…
Microsoft highlights attackers are using fileless methods to persist on SQL servers
On Tuesday, Microsoft warned about a malicious campaign targeting SQL servers that uses a built-in PowerShell binary to persist on affected systems. The intrusions, which make the most of brute-force attacks as an initial compromise vector, are exceptional for their…