LiteSpeed Cache Plugin XSS Flaw Exposes 4M+ Sites to Attack
A critical vulnerability has been discovered in the LiteSpeed Cache plugin, a popular WordPress plugin installed on over 4 million websites. This flaw, identified as…
A critical vulnerability has been discovered in the LiteSpeed Cache plugin, a popular WordPress plugin installed on over 4 million websites. This flaw, identified as…
NIST’s Applied Cybersecurity Division has updated its framework to better suit the needs of a wider range of users, reflecting recent cybersecurity challenges and management…
Suspected Chinese state-sponsored hackers leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated “a nuanced understanding of the appliance”, according…
On Wednesday February 21, 2024, Change Healthcare—a subsidiary of UnitedHealth Group—experienced serious system outages due to a cyberattack. In a Form 8-K filing the company…
Feb 28, 2024The Hacker NewsWebinar / Privacy In today’s digital era, data privacy isn’t just a concern; it’s a consumer demand. Businesses are grappling with…
Those who suffered at the hands of the Post Office say the public spat between a former Post Office chairman, its current CEO and the…
In the field of technology, innovation often comes hand in hand with intrigue and apprehension. Enter the Apple Vision Pro—a groundbreaking mixed-reality headset unveiled amidst…
Russia-linked APT28 compromised Ubiquiti EdgeRouters to facilitate cyber operations Pierluigi Paganini February 28, 2024 Russian cyberspies are compromising Ubiquiti EdgeRouters to evade detection, warns a…
Threat actors use weaponized PDF files to exploit software vulnerabilities, enabling them to execute malicious code on a target system. PDFs provide a common and…
In a significant cybersecurity incident, loanDepot, a prominent player in the loan and mortgage industry, announced a data breach that potentially compromised the sensitive personal…
Russian hackers, part of Russia’s Main Intelligence Directorate of the General Staff, are using compromised Ubiquiti EdgeRouters to build extensive botnets, steal credentials, collect NTLMv2…
Feb 28, 2024The Hacker NewsZero Trust / Cyber Threat Traditional perimeter-based security has become costly and ineffective. As a result, communications security between people, systems,…