Cybersecurity company Censys has identified over 380,000 hosts that are still referencing the malicious polyfill.io domain. Censys reported that over 380,000 internet-exposed hosts are still referencing the malicious polyfill.io domain. The polyfill.io domain was suspended last week following multiple reports…
Category: EN
OVHcloud Sees Record 840 Mpps DDoS Attack
OVHcloud says it mitigated the largest ever DDoS attack leveraging packet rate, which peaked at 840 Mpps. The post OVHcloud Sees Record 840 Mpps DDoS Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
In Other News: Microsoft Details ICS Flaws, Smart Grill Hacking, Predator Spyware Activity
Noteworthy stories that might have slipped under the radar: Microsoft details Rockwell HMI vulnerabilities, smart grills hacked, Predator spyware activity drops. The post In Other News: Microsoft Details ICS Flaws, Smart Grill Hacking, Predator Spyware Activity appeared first on SecurityWeek.…
How Intelligence Sharing Can Help Keep Major Worldwide Sporting Events on Track
The Olympic Games is only 29 days long, so set up and take down is a very intense period, where the threat actors can take advantage. The post How Intelligence Sharing Can Help Keep Major Worldwide Sporting Events on Track…
This New Ransomware Group Uses Phone Calls to Pressure Victims
Researchers have identified a new ransomware group called Volcano Demon, responsible for at least two successful attacks in the past two weeks. Tim West, an analyst at cybersecurity firm Halcyon, revealed that the group targeted companies in the manufacturing…
Blueprint for Success: Implementing a CTEM Operation
The attack surface isn’t what it once was and it’s becoming a nightmare to protect. A constantly expanding and evolving attack surface means risk to the business has skyrocketed and current security measures are struggling to keep it protected. If…
Vinted Fined €2.3m Over Data Protection Failure
The Lithuanian data protection authority has imposed a fine of almost $2.5m on second-hand specialist Vinted for breaching GDPR This article has been indexed from www.infosecurity-magazine.com Read the original article: Vinted Fined €2.3m Over Data Protection Failure
Hacker Stole OpenAI Internal Documents – Report
Security breach reportedly occurred at OpenAI last year, with a hacker stealing internal documents, but no source code This article has been indexed from Silicon UK Read the original article: Hacker Stole OpenAI Internal Documents – Report
Editorial: Labour Wins: A New Tech Strategy for Britain?
As Labour rolls out ambitious plans, including a focus on AI in healthcare and support for startups, the success of this multifaceted strategy will depend on navigating complex challenges and maintaining a dynamic yet secure tech environment. This article has…
Mekotio Banking Trojan Attacking American Users To Steal Financial Data
Active since 2015, Mekotio is a Latin American banking trojan specifically designed to target financial data in regions like Brazil, Chile, Mexico, Spain, and Peru. It exhibits links to the recently disrupted Grandoreiro malware, both likely originating from the same…
Get Advanced Ad Blocking and Superior Data Privacy Tools for Just $11 Until 7/21
Block popups, banners and video ads while also protecting yourself from activity trackers, phishing attempts, fraudulent websites and other types of malware with AdGuard. This article has been indexed from Security | TechRepublic Read the original article: Get Advanced Ad…
New Golang Zergeca Botnet appeared in the threat landscape
The researchers at QiAnXin XLab team discovered a new Golang-based botnet called Zergeca, capable of conducting DDoS attacks. It was detected through a suspicious ELF file and has been used to launch DDoS attacks in Canada, the U.S., and Germany.…
Amazon To Discontinue Astro Security Robot
End of the line for Amazon’s Astro security guard robot for businesses, which will be bricked in September this year This article has been indexed from Silicon UK Read the original article: Amazon To Discontinue Astro Security Robot
Kimusk’s HappyDoor Executed Via regsvr32 File To Evade Detection
Kimsuky, also known as the Velvet Chollima, Black Banshee, THALLIUM, or Emerald Sleet, is a North Korean state-sponsored advanced cyber espionage group that uses sophisticated methods to target political, economic, and national security interests for various countries. They are very…
New Golang-based Zergeca Botnet appeared in the threat landscape
Researchers uncovered a new Golang-based botnet called Zergeca that can carry out distributed denial-of-service (DDoS) attacks. Researchers at the QiAnXin XLab team uncovered a new Golang-based botnet called Zergeca that can carry out distributed denial-of-service (DDoS) attacks. On May, 2024,…
Some Data Is ‘Breached’ During a Hacking Attack on the Alabama Education Department
Alabama’s education superintendent said some data was breached during a hacking attempt at the State Department of Education. The post Some Data Is ‘Breached’ During a Hacking Attack on the Alabama Education Department appeared first on SecurityWeek. This article has…
EU Opens Applications for Cybersecurity and Digital Skills Funding
The EU’s Digital Europe Programme (DEP) will provide over €210m in funding for cybersecurity and digital skills projects This article has been indexed from www.infosecurity-magazine.com Read the original article: EU Opens Applications for Cybersecurity and Digital Skills Funding
Hackers Compromised Ethereum’s Mailing List to Drain Their Crypto Funds
In a recent cyberattack, hackers successfully compromised Ethereum’s mailing list, attempting to drain users’ crypto funds through a sophisticated phishing campaign. The breach has raised significant concerns within the cryptocurrency community, prompting immediate action from Ethereum’s internal security team. The…
CVE-2024-6387 – regreSSHion Remote Code Execution vulnerability seen in OpenSSH
Earlier this week, on Monday, July 1st, a security regression (CVE-2006-5051) was published in OpenSSH’s server (sshd). Basically, there is a race condition that can lead sshd to handle some signals in an unsafe manner. The worry is that an…
GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks
The malware known as GootLoader continues to be in active use by threat actors looking to deliver additional payloads to compromised hosts. “Updates to the GootLoader payload have resulted in several versions of GootLoader, with GootLoader 3 currently in active…