BeyondTrust December 2024 breach linked to compromised infrastructure API key
The breach was traced back to a third-party application vulnerability that allowed a threat actor to gain access to a BeyondTrust AWS account.
The breach was traced back to a third-party application vulnerability that allowed a threat actor to gain access to a BeyondTrust AWS account.
The platform said that the attack was a “zero-click” operation.
CISA urges organizations to disconnect vulnerable Contec CMS8000 devices.
In brief: the Cracked and Nulled cybercrime forums shut down, Zyxel zero-day exploited in the wild, and more.
Cracked and Nulled served as hubs for illegal activity, from discussions about cybercrime to the sale of stolen data, malware, and hacking tools.
The flaw allows unauthenticated attackers to execute arbitrary commands via the vulnerable devices’ ‘supervisor’ or ‘zyuser’ service accounts.
In both SLAP and FLOP, attackers can use side-channel techniques to infer data about the CPU's internal state.
Russia's GRU and its FSB were offering Polish citizens between 3,000 and 4,000 euros to spread disinformation.
The campaign leverages stolen documents from one compromised victim to infiltrate other high-value targets.
The operation involves well-known malware like Agent Tesla and Snake Keylogger, as well as a previously undocumented backdoor known as TorNet.
Showing elements 811 - 820