Malicious Kong Ingress Controller Image Found on DockerHub
A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account and replaced the legitimate Kong Ingress Controller…
A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account and replaced the legitimate Kong Ingress Controller…
SUMMARY Indictment Filed: Three Russian nationals have been indicted for operating cryptocurrency mixers Blender.io and Sinbad.io, used to launder cybercrime proceeds. Criminal Links: The mixers…
SUMMARY Telefonica confirmed a data breach involving its internal Jira ticketing system, with stolen data leaked online. Hackers used compromised employee credentials to access and…
With the advent of virtual reality, everyone got scared that the life we know will disappear, and only those who understand new technologies will be…
SUMMARY Phishing Scam Targets Job Seekers: Cybercriminals impersonate CrowdStrike recruiters to distribute cryptominer malware via fake job offers. Malware Delivery: Victims are tricked into downloading…
SUMMARY Fake PoC Exploit for CVE-2024-49113: A malicious exploit, “LDAPNightmare,” targets researchers by disguising it as a PoC for a patched Windows LDAP vulnerability. Data…
SUMMARY Infoblox discovered widespread domain spoofing in spam campaigns while investigating ‘Muddling Meerkat.’ Collaboration with the cybersecurity community linked Muddling Meerkat’s DNS activities to spam…
SUMMARY Critical Vulnerabilities Identified: Ivanti has disclosed two critical vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Connect Secure, Policy Secure, and ZTA Gateways, with CVE-2025-0282 already being…
SUMMARY Banshee Stealer targets macOS users, distributed via fake GitHub repositories and phishing sites. The malware steals browser credentials, cryptocurrency wallets, 2FA codes, and system…
Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving cybersecurity risks. Cybersecurity threats are no longer…
Explore top cybersecurity risks in crypto, including phishing, ransomware, and MitM attacks. Learn practical tips to safeguard your digital assets now. Cryptocurrencies have recently increased…
Torrance, United States / California, January 9th, 2025, CyberNewsWire Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal…