Cheap Chinese Android phones ship with trojanized WhatsApp and Telegram clones hiding crypto clippers, active since June 2024. Since June 2024, Doctor Web researchers found cheap Android phones preloaded with fake WhatsApp and Telegram apps designed to steal crypto via…
Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial
The Rhysida ransomware gang claims to have stolen 2.5 Tb of files from the Oregon Department of Environmental Quality. The post Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial appeared first on SecurityWeek. This article has been…
From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains
Introduction Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue to expand their reliance on third-party vendors, cloud-based services, and global logistics networks, cybercriminals are exploiting vulnerabilities within these interconnected systems to…
Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins
Threat actors are leveraging an artificial intelligence (AI) powered presentation platform named Gamma in phishing attacks to direct unsuspecting users to spoofed Microsoft login pages. “Attackers weaponize Gamma, a relatively new AI-based presentation tool, to deliver a link to a…
[UPDATE] [mittel] Red Hat Enterprise Linux (opentelemetry-collector): Schwachstelle ermöglicht Denial of Service
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux im opentelemetry-collector ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel:…
[UPDATE] [mittel] Red Hat OpenShift: Schwachstelle ermöglicht Offenlegung von Informationen
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat OpenShift ausnutzen, um Informationen offenzulegen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Red Hat OpenShift: Schwachstelle ermöglicht…
[UPDATE] [mittel] Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat OpenShift Container Platform ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE]…
[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Zustand herbeizuführen, Daten zu manipulieren oder nicht näher spezifizierte Auswirkungen zu erzielen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories)…
[UPDATE] [mittel] Xen: Mehrere Schwachstellen
Ein Angreifer kann mehrere Schwachstellen in Xen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder Informationen offenzulegen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Xen: Mehrere Schwachstellen
Eclipse and STMicroelectronics vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities found in Eclipse ThreadX and four vulnerabilities in STMicroelectronics. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party…
Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition
Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow attackers to exploit memory corruption. The fix comes following the discovery and reporting of the vulnerability by the Mozilla Fuzzing Team, as detailed in Mozilla Foundation…
Threat Actors Misuse Node.js To Deliver Malware – Warns Microsoft
Microsoft has issued a warning about threat actors increasingly misusing Node.js to deliver malware and malicious payloads, leading… The post Threat Actors Misuse Node.js To Deliver Malware – Warns Microsoft appeared first on Hackers Online Club. This article has been…
Hacktivist Turns More Sophisticated Targeting Critical Infrastructure to Deploy Ransomware
Hacktivist groups are rapidly evolving beyond their traditional tactics of DDoS attacks and website defacements into far more sophisticated operations targeting critical infrastructure and deploying ransomware. This alarming shift represents a significant escalation in the threat landscape, as ideologically motivated…
Threat Intelligence Feeds Flood Analysts With Data, But Context Still Lacking
In the digital age, organizations face a relentless barrage of cyber threats, ranging from sophisticated nation-state attacks to opportunistic ransomware campaigns. To keep pace, security teams have turned to threat intelligence feeds—automated streams of data that provide real-time information about…
How CISOs Can Create a Culture of Cybersecurity Accountability
In the modern business landscape, cybersecurity is no longer just an IT problem; it has become a core business concern that requires a culture of cybersecurity accountability at every organizational level. As cyber threats grow more sophisticated and frequent, the…
Automating Threat Intelligence: Tools And Techniques For 2025
As cyber threats continue to grow in both scale and sophistication, organizations in 2025 are increasingly relying on automation to transform their threat intelligence (TI) operations. Automated threat intelligence leverages artificial intelligence (AI), machine learning (ML), and orchestration platforms to…
Hackers Revealed the Exploit Method Used to Hack 4chan Messageboard
Following yesterday’s major security breach of the controversial imageboard 4chan, hackers have publicly revealed the sophisticated exploit method used to gain access to the site’s backend systems. The attack, which took the platform offline for several hours, has exposed sensitive…
Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild
In recent attacks, the state-sponsored backdoor BPFDoor is using a controller to open a reverse shell and move laterally. The post Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild appeared first on SecurityWeek. This article has been indexed…
Funding uncertainty may spell the end of MITRE’s CVE program
The future of the Common Vulnerabilities and Exposures (CVE) program hangs in the balance: MITRE, the not-for-profit US organization that runs it, could lose the US federal funding that helps them maintain it. But others have been waiting in the…
Updates von Oracle: 378 Security-Patches aber nichts zum Einbruch in die Cloud
Im Rahmen des regelmäßigen Update-Zyklus liefert Oracle Patches satt für fast die gesamte Produktpalette, die die Kunden zügig installieren sollten. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Updates von Oracle: 378 Security-Patches aber nichts…
Critical Vulnerability Found in Apache Roller Blog Server
A critical vulnerability in Apache Roller could be used to maintain persistent access by reusing older sessions even after password changes. The post Critical Vulnerability Found in Apache Roller Blog Server appeared first on SecurityWeek. This article has been indexed…
Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures
Microsoft maintains a continuous effort to protect its platforms and customers from fraud and abuse. This edition of Cyber Signals takes you inside the work underway and important milestones achieved that protect customers. The post Cyber Signals Issue 9 |…
IT Security News Hourly Summary 2025-04-16 12h : 21 posts
21 posts were published in the last hour 10:3 : Hacktivist Group Becomes More Sophisticated, Targets Critical Infrastructure to Deploy Ransomware 10:3 : Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems 10:3 : APT29 Hackers Use…
Messenger-Alternative: Volla Messages mit großen Versprechungen
Die angebliche “WhatsApp- und Telegram-Alternative” Volla Messages wird mit Lob überhäuft, kann aber noch(?) kaum echte Vorteile ins Feld führen. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Messenger-Alternative: Volla Messages mit großen Versprechungen