Hackerone logo
20
Jun
2024

Community-driven PTaaS vs. Traditional Pentesting

Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However,…

Atlassian fixed six high-severity bugs in Confluence
20
Jun
2024

Atlassian fixed six high-severity bugs in Confluence

Atlassian fixed six high-severity bugs in Confluence Data Center and Server Pierluigi Paganini June 20, 2024 Australian software company Atlassian…

VMware
20
Jun
2024

UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs

A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named ‘Reptile’ and ‘Medusa’ to remain hidden on…

Total Fitness: Unprotected Database Exposed Photos, Names & Bank Details
20
Jun
2024

UK Health Club Chain ‘Total Fitness’ Data Leak Exposes KYC and Card Data

A recent KYC (Know Your Customer) data exposure at Total Fitness, a members-only club in the UK, left personal details…

Crown Equipment
20
Jun
2024

Apparent Ransomware Attack Suspends Operations At Crown Equipment

Crown Equipment, a global top five forklift manufacturer, was hit by a cyberattack that has disrupted its manufacturing operations for…

The pros, cons and misconceptions of dynamic pricing for retailers
20
Jun
2024

The pros, cons and misconceptions of dynamic pricing for retailers

Advances in technology are making it increasingly possible for retailers and hospitality companies to be more intelligent with their pricing…

SolarWinds
20
Jun
2024

SolarWinds Serv-U path-traversal flaw actively exploited in attacks

Threat actors are actively exploiting a SolarWinds Serv-U path-traversal vulnerability, leveraging publicly available proof-of-concept (PoC) exploits. Although the attacks do…

1inch partners with Blockaid to enhance Web3 security through the 1inch Shield
20
Jun
2024

Hackers Exploit Progressive Web Apps to Steal Passwords

In a concerning development for cybersecurity, hackers are increasingly leveraging Progressive Web Apps (PWAs) to execute sophisticated phishing attacks aimed…

Naveen Goud
20
Jun
2024

Now a Doctrine for Cyberspace Operations

Have you ever heard of a Doctrine meant to formulate cyber space operations? Well, here’s a news piece that might…

Russian-Linked Cyber Attacks
20
Jun
2024

French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks

Jun 20, 2024NewsroomCyber Espionage / Hacking News State-sponsored actors with ties to Russia have been linked to targeted cyber attacks…

Chinese Hackers Targeted Telecommunications Of Asian Country
20
Jun
2024

Chinese Hackers Targeted Telecommunications Of Asian Country

Researchers have discovered that various threat actors groups associated with Chinese state-linked espionage have been conducting a sustained hacking campaign…

China-linked spies target Asian Telcos since at least 2021
20
Jun
2024

China-linked spies target Asian Telcos since at least 2021

China-linked spies target Asian Telcos since at least 2021 Pierluigi Paganini June 20, 2024 A China-linked cyber espionage group has…