Google holds the top opening with more than 547 weaknesses, Microsoft is on number two with 432 undesirable openness occurrences and Oracle is on number three with 316 weaknesses in H1 2021. The most recent AtlasVPN research examines mobile security…
Latest posts - Page 80
Data breaches at Texas behavioral health Center
A data breaches at Texas social wellbeing supplier Texoma Community Center influenced in excess of 24,000 individuals and features how timetables for break notice might fall behind security occasions—in any event when the most delicate data is compromised. Texoma is…
VPN at Virgin Media’s router unmasked zero-day vulnerability
Researchers have discovered a zero-day vulnerability in Virgin Media’s Super Hub 3 routers that allow attackers to see VPN customers’ real IP addresses. Nearly two years after originally alerting Virgin Media, a British telco, to the weakness, a UK penetration…
Supply Chain Attacks on Open-Source Repositories Surged
According to a new Sonatype analysis, supply chain attacks on open-source public repositories have surged by 650 percent in the last year. This may be related to the growing interest in open-source initiatives, which has increased by 73% in the…
Indonesia: No Evidence of Alleged Chinese Intel Hack
Following an alarm from a U.S.-based private cybersecurity firm about a possible intrusion of its internal networks by a Chinese hacking organization, Indonesia authorities discovered no evidence that the country’s primary intelligence service’s computers had been affected, an official said.…
VoIP.ms phone: disrupted by DDoS
Threat actors are launching a DDoS attack against VoIP.ms, a voice-over-Internet service provider, and threatening to extort money if it doesn’t stop. VoIP.ms is an Internet phone service provider that offers low-cost voice-over-IP services to companies all over the world.…
APT-C-36 Drops Commodity RATs
APT-C-36 is now running a spam campaign that uses commodity RATs to infiltrate South American companies for financial gain. njRAT, BitRAT, Async RAT, and Lime RAT are reportedly among the RATs being used by the group. The group’s motivations are…
PYSA ransomware Group: Joins the Cabal of Malware Groups
With the recent addition of Linux-based systems compatibility, the PYSA ransomware gang has broadened its assault surface. On VirusTotal, experts discovered a Linux version of Chachi. The PYSA ransomware group’s domains are used by ChaChi’s DNS tunneling backdoor, which is…
Yonkers attacked by ransomware
Following a ransomware attack, government employees in the City of Yonkers were refused access to their computers last week. The city stated that it would not pay the ransom and would restore as much data from backups as possible. Employees…
Australia, UK, and US Announce a Security Alliance
The US, the UK, and Australia have announced a historic trilateral pact on security and defense. The new AUKUS treaty will bring the three countries closer together than ever before in sectors such as artificial intelligence, cyber capabilities, crucial quantum…