Attackers Target ProxyLogon Exploit to Install Cryptojacker
Threat actors targeted compromised Exchange servers to host malicious Monero cryptominer in an “unusual attack,” Sophos researchers discovered. [...]
Threat actors targeted compromised Exchange servers to host malicious Monero cryptominer in an “unusual attack,” Sophos researchers discovered. [...]
Search-engine optimization (SEO) tactics direct users searching for common business forms such as invoices, receipts or other templates to hacker-controlled Google-hosted domains. [...]
Search-engine optimization (SEO) tactics direct users searching for common business forms such as invoices, receipts or other templates to hacker-controlled Google-hosted domains. [...]
An update to Google’s browser that fixes the flaw is expected to be released on Tuesday. [...]
Like the Facebook incident earlier this week, the information — including user profile IDs, email addresses and other PII -- was scraped from the social-media platform. [...]
Industrial enterprises in Europe are target of campaign, which forced a shutdown of industrial processes in at least one of its victims’ networks, according to researchers. [...]
The flaw that caused the leak of personal data of more than 533 million users over the weekend no longer exists; however, the social media giant still faces an investigation by EU regulators. [...]
New details of negotiation between attackers and officials from Broward County Public Schools emerge after a ransomware attack early last month. [...]
Attackers are impersonating the stock-trading broker using fake websites to steal credentials as well as sending emails with malicious tax files. [...]
Cyberattackers have set up a website for a fake company called SecuriElite, as well as associated Twitter and LinkedIn accounts. [...]
Researchers uncover a credential-stealing campaign targeting genetic, neurology and oncology professionals. [...]
A class-action suit in Florida accuses the tech giant of unlawfully intercepting communications by using session-replay software to capture the interaction of people visiting the corporate homepage Intel.com. [...]
The incident, which forced the company to disconnect its systems, caused significant business disruption. [...]
New research shows that while all sectors are at risk, 70 percent of manufacturing apps have vulnerabilities. [...]
A new infection vector from the established malware puts internet-facing Windows systems at risk from SMB password brute-forcing. [...]
Attackers accessed personal and business data from the company’s legacy file-transfer service in a recent data-security incident but core IT systems remained untouched. [...]
A previously undocumented password and cookie stealer has been compromising accounts of big guns like Facebook, Apple, Amazon and Google since 2019 and then using them for cybercriminal activity. [...]
The newly discovered steganography method could be exploited by threat actors to obscure nefarious activity inside photos hosted on the social-media platform. [...]
Researchers say China-linked APTs lure victims with bogus Huawei career pages in what they dub ‘Operation Diànxùn’. [...]
Researchers from Sucuri discovered the tactic, which creatively hides malicious activity until the info can be retrieved, during an investigation into a compromised Magento 2 e-commerce site. [...]
The multinational brewing company did not say what type of incident caused a ‘systems outage,’ but it's investigating and working to get networks back online. [...]
The F5 flaws could affect the networking infrastructure for some of the largest tech and Fortune 500 companies - including Microsoft, Oracle and Facebook. [...]
Surveillance footage from companies such as Tesla as well as hospitals, prisons, police departments and schools was accessed in the hack. [...]
Researchers have identified two vulnerabilities in the company’s crowd-sourced Offline Finding technology that could jeopardize its promise of privacy. [...]
EFF worries that the Google's ‘privacy-first” vision for the future may pose new privacy risks. [...]