SAP NetWeaver Vulnerabilities Let Attackers Upload Malicious PDF Files
10
Dec
2024

SAP NetWeaver Vulnerabilities Let Attackers Upload Malicious PDF Files

SAP has issued a crucial security update addressing multiple high-severity vulnerabilities in its NetWeaver Application Server for Java, specifically within…

Visual Studio Tunnels Abused For Stealthy Remote Access
10
Dec
2024

Visual Studio Tunnels Abused For Stealthy Remote Access

In an attack campaign dubbed “Operation Digital Eye,” a suspected China-nexus threat actor has been observed targeting business-to-business IT service…

Hackers Target Job Seekers with Banking Trojan Using Fake Job Emails
10
Dec
2024

Hackers Target Job Seekers with Banking Trojan Using Fake Job Emails

SUMMARY AppLite Trojan: A new, stealthy banking trojan targeting Android devices, capable of stealing banking credentials, crypto wallets, and sensitive…

Stamus Networks Clear NDR uncovers unauthorized activity
10
Dec
2024

Stamus Networks Clear NDR uncovers unauthorized activity

Stamus Networks announced Clear NDR, an open and transparent NDR system that empowers cyber defenders to uncover and stop serious…

Mobile Phishing Campaign
10
Dec
2024

Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam

Dec 10, 2024Ravie LakshmananMobile Security / Cryptocurrency Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign…

RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins
10
Dec
2024

RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins

An ongoing RedLine info-stealer effort targets Russian-speaking entrepreneurs using unlicensed corporate software copies to automate business operations. Attackers were distributing…

RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins
10
Dec
2024

RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins

Attackers are distributing a malicious .NET-based HPDxLIB activator disguised as a new version, which is signed with a self-signed certificate,…

Horizon3.ai NodeZero Insights enables executives to visualize changes in their security posture
10
Dec
2024

Horizon3.ai NodeZero Insights enables executives to visualize changes in their security posture

Horizon3.ai launched NodeZero Insights, a platform designed for security leaders, CIOs, CISOs and practitioners. This new solution delivers real-time dashboards…

UK police continue to hold millions of custody images unlawfully
10
Dec
2024

UK police continue to hold millions of custody images unlawfully

Millions of unlawfully retained custody images could still be used for facial-recognition purposes by UK police, says biometric commissioner of…

VSCode
10
Dec
2024

Chinese hackers use Visual Studio Code tunnels for remote access

Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain…

HackerOne's Largest Bug Bounty Program Boasts 300 Hackers, $2M In Rewards
10
Dec
2024

HackerOne’s Largest Bug Bounty Program Boasts 300 Hackers, $2M In Rewards

10 Dec HackerOne’s Largest Bug Bounty Program Boasts 300 Hackers, $2M In Rewards Posted at 08:40h in Blogs by Taylor…

Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)
10
Dec
2024

Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)

Attackers are exploiting a vulnerability (CVE-2024-50623) in file transfer software by Cleo – LexiCo, VLTransfer, and Harmony – to gain…