Cyber security week in review: September 2, 2022
The world in brief: The REvil ransomware gang apparently comes back from the dead, Iranian hackers exploit Log4j vulnerabilities, and more
The world in brief: The REvil ransomware gang apparently comes back from the dead, Iranian hackers exploit Log4j vulnerabilities, and more
53% of the apps were using the same AWS access tokens found in other apps, indicating a supply chain vulnerability.
The scammers were involved in scamming citizens of Ukraine and European Union countries interested in cryptocurrency, securities, gold, and oil investments.
The payouts will range from $100 to $31,337 depending on the severity of the security issue and project’s importance.
Tykelab’s tracking system involves the exploitation of vulnerabilities in global phone networks which make it possible for third parties to spy on phones.
Fears that the Russia-Ukraine war is setting a dangerous precedent for modern cyberwarfare with the involvement of third-party cybercriminal groups and hacktivists may be overblown.
New recruits will gain the skills and training needed to defend the nation from the growing number of cybersecurity threats.
Active since 2019, Nitrokod is a Turkish speaking software developer that claims to offer free and safe software but in reality delivers cryptomining malware.
The flaw impacts all Bitbucket Server and Data Center versions released after 6.10.17 including 7.0.0 and newer.
64% of respondents suspect their organization has been either directly targeted or affected by a nation-state cyberattack.
Showing elements 2371 - 2380