Category: Bleeping Computer
Hackers use a novel method involving RBAC (Role-Based Access Control) to create persistent backdoor accounts on Kubernetes clusters and hijack…
The American Bar Association (ABA) has suffered a data breach after hackers compromised its network and gained access to older…
Websites of multiple U.S. universities are serving Fortnite and ‘gift card’ spam. Researchers observed Wiki and documentation pages being hosted by universities including Stanford, MIT, Berkeley,…
Attackers are using Eval PHP, an outdated legitimate WordPress plugin, to compromise websites by injecting stealthy backdoors. Eval PHP is an…
Google’s Threat Analysis Group (TAG) has been monitoring and disrupting Russian state-backed cyberattacks targeting Ukraine’s critical infrastructure in 2023. Google…
VMware addressed a critical vRealize Log Insight security vulnerability that allows remote attackers to gain remote execution on vulnerable appliances….
A new Lazarus campaign considered part of “Operation DreamJob” has been discovered targeting Linux users with malware for the first…
Microsoft is investigating an ongoing outage blocking customers worldwide from accessing and using web apps and online services. The list…
London-based professional outsourcing giant Capita has published an update on the cyber-incident that impacted it at the start of the…
An investigation into last month’s 3CX supply chain attack discovered that it was caused by another supply chain compromise where…
In a confusing mess, a recent Microsoft Defender update rolled out a new security feature called ‘Kernel-mode Hardware-enforced Stack Protection,’…
Fortra has completed its investigation into the exploitation of CVE-2023-0669, a zero-day flaw in the GoAnywhere MFT solution that the…











