Category: Bleeping Computer
The X_Trader software supply chain attack that led to last month’s 3CX breach has also impacted at least several critical…
Google has addressed a Cloud Platform (GCP) security vulnerability impacting all users and allowing attackers to backdoor their accounts using…
Hackers use a novel method involving RBAC (Role-Based Access Control) to create persistent backdoor accounts on Kubernetes clusters and hijack…
The American Bar Association (ABA) has suffered a data breach after hackers compromised its network and gained access to older…
Websites of multiple U.S. universities are serving Fortnite and ‘gift card’ spam. Researchers observed Wiki and documentation pages being hosted by universities including Stanford, MIT, Berkeley,…
Attackers are using Eval PHP, an outdated legitimate WordPress plugin, to compromise websites by injecting stealthy backdoors. Eval PHP is an…
Google’s Threat Analysis Group (TAG) has been monitoring and disrupting Russian state-backed cyberattacks targeting Ukraine’s critical infrastructure in 2023. Google…
VMware addressed a critical vRealize Log Insight security vulnerability that allows remote attackers to gain remote execution on vulnerable appliances….
A new Lazarus campaign considered part of “Operation DreamJob” has been discovered targeting Linux users with malware for the first…
Microsoft is investigating an ongoing outage blocking customers worldwide from accessing and using web apps and online services. The list…
London-based professional outsourcing giant Capita has published an update on the cyber-incident that impacted it at the start of the…
An investigation into last month’s 3CX supply chain attack discovered that it was caused by another supply chain compromise where…