No menu items!
No menu items!
More

    News

    Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation

    In one of the largest coordinated law enforcement operations, authorities have dismantled Kidflix, a streaming platform that offered child sexual abuse material (CSAM). "A...

    Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign

    Apr 03, 2025Ravie LakshmananCybersecurity / Threat Intelligence Threat hunters are warning of a sophisticated web skimmer campaign that leverages a legacy application programming interface...

    Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse

    Apr 02, 2025Ravie LakshmananCloud Security / Vulnerability Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud...

    Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

    Apr 02, 2025Ravie LakshmananCryptojacking / Malware Cybersecurity researchers have shed light on an "auto-propagating" cryptocurrency mining botnet called Outlaw (aka Dota) that's known for...

    A Step by Step Guide for Service Providers

    Apr 02, 2025The Hacker NewsCompliance / Data Protection Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data...

    How SSL Misconfigurations Impact Your Attack Surface

    Apr 02, 2025The Hacker NewsWeb Security / Attack Surface When assessing an organization's external attack surface, encryption-related issues (especially SSL misconfigurations) receive special attention....

    FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites

    Apr 02, 2025Ravie LakshmananRansomware / Email Security The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis...

    New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth

    Apr 02, 2025Ravie LakshmananThreat Detection / Malware Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new...

    Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign

    Apr 01, 2025Ravie LakshmananCryptojacking / Cloud Security Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain unauthorized access and deploy...

    Latest articles

    spot_imgspot_img