1 posts were published in the last hour 1:32 : Apache fixed a critical SQL Injection in Apache Traffic Control
Apache fixed a critical SQL Injection in Apache Traffic Control
Apache Software Foundation (ASF) addressed a critical SQL Injection vulnerability, tracked as CVE-2024-45387, in Apache Traffic Control. The Apache Software Foundation (ASF) released security updates to address a critical security vulnerability, tracked as CVE-2024-45387 (CVSS score 9.9), in Traffic Control. Traffic Control…
Capturing Honeypot Data Beyond the Logs, (Thu, Dec 26th)
By default, DShield Honeypots [1] collect firewall, web and cowrie (telnet/ssh) [2] data and log them on the local filesystem. A subset of this data is reported to the SANS Internet Storm Center (ISC) where it can be used by…
IT Security News Hourly Summary 2024-12-26 00h : 3 posts
3 posts were published in the last hour 22:55 : IT Security News Daily Summary 2024-12-25 22:32 : SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps 22:32 : BellaCPP, Charming Kitten’s BellaCiao variant written in C++
IT Security News Daily Summary 2024-12-25
47 posts were published in the last hour 22:32 : SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps 22:32 : BellaCPP, Charming Kitten’s BellaCiao variant written in C++ 20:5 : IT Security News Hourly Summary 2024-12-25 21h :…
SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps
Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: SEO Poisoning: How…
BellaCPP, Charming Kitten’s BellaCiao variant written in C++
Iran-linked APT group Charming Kitten has been observed using a new variant of the BellaCiao malware dubbed BellaCPP, Kaspersky researchers warn. The Iran-linked APT group Charming Kitten has been observed using a C++ variant of the BellaCiao malware, dubbed BellaCPP.…
IT Security News Hourly Summary 2024-12-25 21h : 2 posts
2 posts were published in the last hour 20:3 : Schlaflos? Stiftung Warentest zeigt, welche Schlaf-Apps wirklich helfen 19:32 : Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online
Schlaflos? Stiftung Warentest zeigt, welche Schlaf-Apps wirklich helfen
Die Stiftung Warentest wirft einen Blick auf Schlaf-Apps und zeichnet in einem Test zwei der Programme mit Bestnoten aus – leider gibt es aber auch mangelhafte Ergebnisse. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den…
Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online
Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from the Indonesian government’s Regional Financial Management Information System (Sistem Informasi Pengelolaan Keuangan Daerah, or SIPKD). This system is operated by the Badan Pendapatan, Pengelolaan Keuangan, dan Aset…
How to Build a YouTube Clone With Svelte.js, Firebase, and Permit.io
Creating a video-sharing application like YouTube is not just about front-end design and data storage; you need to have secure dynamic control over what users can see and do. With Svelte.js handling the interface and Firebase supporting backend functionalities, integrating…
Look Who’s Back: LockBit Gears Up for a Comeback With Version 4.0
The infamous LockBit ransomware group has announced its return with the upcoming release of LockBit 4.0, set for February 2025. This marks a big moment for the group, which has had major setbacks over the last year. A global…
New Alert: Windows and Mac Are the Target of a Self-Deleting Ransomware
The ransomware epidemic may have been stopped by recent law enforcement operations that disrupted attack infrastructure, led to the arrest of cybercriminals, and broke up some threat groups, but this would be wrong as well. A recent study on…
Global Crypto Hacks Escalate to $2.2 Billion in 2024
Chainalysis, a blockchain analytics company that provides data analysis on the blockchain ecosystem, has reported that the volume of compromised crypto funds and the number of hacking incidents are set to rise in 2024. The report states that the…
Free VPN Big Mama Raises Security Concerns Amid Cybercrime Links
Big Mama VPN, a free virtual private network app, is drawing scrutiny for its involvement in both legitimate and questionable online activities. The app, popular among Android users with over a million downloads, provides a free VPN service while…
IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack
IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating system that could potentially lead to denial-of-service (DoS) attacks. The affected kernel extensions—perfstat and TCP/IPmpresent risks to systems running on AIX 7.2, AIX 7.3, VIOS 3.1,…
USA Launched Cyber Attack on Chinese Technology Firms
The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber espionage targeting Chinese technology companies and research institutions. These attacks, suspected to be orchestrated by U.S. intelligence agencies, aimed to steal sensitive commercial secrets and intellectual…
Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server
The Apache Software Foundation has issued a security alert regarding a critical vulnerability in Apache HugeGraph-Server. The flaw, identified as CVE-2024-43441, could potentially allow authentication bypass due to an issue with assumed-immutable data in JWT tokens. The vulnerability impacts versions…
IT Security News Hourly Summary 2024-12-25 18h : 2 posts
2 posts were published in the last hour 16:32 : WhatsApp Wins Lawsuit Against Israeli Spyware Maker NSO Group 16:32 : Strengthening Cloud Security: Privacy-Preserving Techniques for Compliance With Regulations and the NIST Framework
WhatsApp Wins Lawsuit Against Israeli Spyware Maker NSO Group
A US court ruled against NSO Group, an Israeli spyware maker, finding them liable for hacking WhatsApp users. The ruling has major implications for the surveillance technology industry.” This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto…
Strengthening Cloud Security: Privacy-Preserving Techniques for Compliance With Regulations and the NIST Framework
As cloud adoption continues to accelerate, securing sensitive data while complying with regulations like GDPR (General Data Protection Regulation), CCPA (California Consumer Privacy Act), and HIPAA (Health Insurance Portability and Accountability Act) is paramount. The flexibility and scalability that cloud environments offer also…
Iran’s Christmas Cyber Attack on Israeli Tech Firm Sparks Alarm
In December 2024, during the festive Christmas season, Iran launched a sophisticated cyber attack on an Israeli software company, resulting in catastrophic consequences. The attack led to a complete data wipe-out, paralysis of IT infrastructure, and the defacement of the…
Police Surveillance in San Francisco: 2024 Year in Review
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> From a historic ban on police using face recognition, to landmark CCOPS legislation, to the first ban in the United States of police deploying deadly force via…
We Stood Up for Access to the Law and Congress Listened: 2024 in Review
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> For a while, ever since they lost in court, a number of industry giants have pushed a bill that purported to be about increasing access to the…