Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured Redis servers with ransomware and cryptocurrency miners.
The development marks the threat's...
Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion
Jun 27, 2024NewsroomCyber Crime / Cyber Warfare
A 22-year-old Russian national has been indicted in the U.S. for his alleged role in staging destructive...
The Secrets of Hidden AI Training on Your Data
Jun 27, 2024The Hacker NewsArtificial Intelligence / SaaS Security
While some SaaS threats are clear and visible, others are hidden in plain sight, both...
How to Use Python to Build Secure Blockchain Applications
Did you know it's now possible to build blockchain applications, known also as decentralized applications (or "dApps" for short) in native Python? Blockchain...
Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks
Cybersecurity researchers have disclosed a high-severity security flaw in the Vanna.AI library that could be exploited to achieve remote code execution vulnerability via...
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application
Jun 27, 2024NewsroomVulnerability / Enterprise Security
A critical security flaw has been disclosed in Fortra FileCatalyst Workflow that, if left unpatched, could allow an...
New MOVEit Transfer Vulnerability Under Active Exploitation
Jun 26, 2024NewsroomVulnerability / Data Protection
A newly disclosed critical security flaw impacting Progress Software MOVEit Transfer is already seeing exploitation attempts in the...
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
Jun 26, 2024NewsroomFirmware Security / Vulnerability
Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to...
Practical Guidance For Securing Your Software Supply Chain
The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their software should come...
Latest articles