Category: EN

Docker Makes 1,000 Hardened Images Free and Open Source

Millions of developers can now use the secure, production-ready images made by Docker. The post Docker Makes 1,000 Hardened Images Free and Open Source appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Docker…

Hackers Targeting HubSpot Users in Targeted Phishing Attack

An active phishing campaign is currently targeting HubSpot users through a sophisticated combination of social engineering and infrastructure compromise. The attack leverages business email compromise tactics, paired with website hijacking, to deliver credential-stealing malware to unsuspecting marketing professionals and business…

US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator

The exchange has been allegedly involved in laundering money for ransomware groups and other transnational cybercriminal organizations. The post US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Making CloudFlare Workers Work for Red Teams

Conditional Access Payload Delivery (CAPD) Use Cloudflare Workers to for payload delivery behind custom headers. This article has been indexed from ZephrSec – Adventures In Information Security Read the original article: Making CloudFlare Workers Work for Red Teams

AI Advertising Company Hacked

At least some of this is coming to light: Doublespeed, a startup backed by Andreessen Horowitz (a16z) that uses a phone farm to manage at least hundreds of AI-generated social media accounts and promote products has been hacked. The hack…

Roundcube Vulnerabilities Allow Attackers to Execute Malicious Scripts

Roundcube Webmail has released critical security updates addressing two significant vulnerabilities affecting versions 1.6 and 1.5 LTS. The flaws could enable attackers to execute malicious scripts and gain unauthorized access to sensitive information through multiple attack vectors. The first vulnerability…

Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration

Hackers are increasingly abusing the popular PuTTY SSH client for stealthy lateral movement and data exfiltration in compromised networks, leaving subtle forensic traces that investigators can exploit. In a recent investigation, responders pivoted to persistent Windows registry artifacts after attackers…