Feds explain how Iranian hackers obtained US voter registration data
The attacks involved exploitation of known vulnerabilities, directory traversal, SQL injection, web shell uploads, and unique flaws in websites.
The attacks involved exploitation of known vulnerabilities, directory traversal, SQL injection, web shell uploads, and unique flaws in websites.
Attackers are using the zero-day Windows flaw together with separate bug in Chrome, which Google already fixed last month.
A weekly vulnerability digest.
The vulnerability allows unauthenticated attackers to take over the system by sending a simple HTTP GET request.
US authorities shared details on the ComRAT malware and the Zebrocy backdoor used by Russia-linked Turla and APT 28 hacker groups.
The Maze group had stopped encrypting new victims in September 2020, and is now trying to get the last payments from their victims.
The attacks involved spoofed emails with invitations ostensibly sent from organizers of the Munich Security Conference and the Think 20 Summit in Saudi Arabia.
The group is focused on gathering intelligence on foreign policy and national security issues related to the Korean peninsula.
Malicious actors exploit known configuration vulnerabilities to gain access to proprietary code repos owned by government entities and private businesses.
The cybercriminals behind the Netwalker ransomware operation claim to have stolen nearly 5 terabytes data from the company.
Showing elements 3411 - 3420