SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files
14
Jun
2024

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a threat actor to read sensitive files…

Military-Grade Cyber Defenses
14
Jun
2024

Why Regulated Industries are Turning to Military-Grade Cyber Defenses

Jun 14, 2024The Hacker NewsCybersecurity / Regulatory Compliance As cyber threats loom large and data breaches continue to pose increasingly…

Bondnet Using High-Performance Bots For C2 Server
14
Jun
2024

Bondnet Using High-Performance Bots For C2 Server

Threat actors abuse high-performance bots to carry out large-scale automated attacks efficiently. These bots can work quickly, flood systems, steal…

Sleepy Pickle Exploit Let Attackers Exploit ML Models & End-Users
14
Jun
2024

Sleepy Pickle Exploit Let Attackers Exploit ML Models & End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt…

CUHK Data Breach
14
Jun
2024

Hackers Target University In Hong Kong

The Chinese University of Hong Kong (CUHK) has been confronted by a massive data breach that has compromised personal information…

Discord-Based Malware Attacking Orgs Linux Systems In India
14
Jun
2024

Discord-Based Malware Attacking Orgs Linux Systems In India

Linux systems are deployed mostly in servers, in the cloud, and in environments that are considered vital; consequently, they are…

0day Vulnerability XSS Payloads
14
Jun
2024

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million Ecuadorian citizens. The announcement was made…

YetiHunter: Open-source threat hunting tool for Snowflake environments
14
Jun
2024

YetiHunter: Open-source threat hunting tool for Snowflake environments

Cloud identity protection company Permiso has created YetiHunter, a threat detection and hunting tool companies can use to query their…

CISA adds Android Pixel, Microsoft Windows, Progress Telerik Report Server bugs to its Known Exploited Vulnerabilities catalog
14
Jun
2024

CISA adds Android Pixel, Microsoft Windows, Progress Telerik Report Server bugs to its Known Exploited Vulnerabilities catalog

CISA adds Android Pixel, Microsoft Windows, Progress Telerik Report Server bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini June…

New Moonstone Sleet North Korean Actor Deploying Malicious Open Source Packages
14
Jun
2024

New Moonstone Sleet North Korean Actor Deploying Malicious Packages

In December 2023, we reported on how North Korean threat actors, particularly Jade Sleet, have been compromising supply chains through…

ZKTeco Biometric System
14
Jun
2024

ZKTeco Biometric System Found Vulnerable to 24 Critical Security Flaws

Jun 14, 2024NewsroomDevice Security / Authentication An analysis of a hybrid biometric access system from Chinese manufacturer ZKTeco has uncovered…

Post Office scandal victims in Scotland have convictions quashed
14
Jun
2024

Post Office scandal victims in Scotland have convictions quashed

Former subpostmasters and Post Office branch staff who were wrongfully convicted of crimes based on flawed computer evidence in Scotland…