Attackers are exploiting two Adobe ColdFusion vulnerabilities (CVE-2023-29298, CVE-2023-38203) to breach servers and install web shells to enable persistent access…
Jul 18, 2023THNMalware / Cyber Attack An unidentified threat actor compromised an application used by multiple entities in Pakistan to…
A threat actor infected their own computer with an information stealer, which has allowed Israeli threat intelligence company Hudson Rock…
A critical design flaw in the Google Cloud Build service discovered by cloud security firm Orca Security can let attackers…
The Football Association (FA) has enlisted the help of its long-standing IT partner Google Cloud to create digital tools that…
A financially motivated cybercrime gang has been observed deploying BlackCat ransomware payloads on networks backdoored using a revamped Sardonic malware…
A 28 years old Former IT security analyst of an Oxford-based company has been sentenced to three years for deceiving…
A user on a hacker forum claimed to have access to the internal software of the US’s prominent children’s family…
Threat actors have started hacking WordPress websites by exploiting a critical vulnerability in the WooCommerce Payments plugin. A fully integrated…
The Cybersecurity & Infrastructure Security Agency (CISA) has released a list of free tools for organizations to secure themselves in…
One of the biggest challenges faced by regulated and non-regulated companies is assessing whether or not another business is safe…
Jul 18, 2023The Hacker NewsCybersecurity / Cyber Attacks Discover stories about threat actors’ latest tactics, techniques, and procedures from Cybersixgill’s…