Ransomware group exploits Citrix NetScaler systems for initial access
A known threat actor specializing in ransomware attacks is believed to be behind a recent campaign that targeted unpatched internet-facing Citrix NetScaler systems to serve…
A known threat actor specializing in ransomware attacks is believed to be behind a recent campaign that targeted unpatched internet-facing Citrix NetScaler systems to serve…
Meal delivery service PurFoods says the personal and protected health information of more than 1.2 million individuals was stolen in a ransomware attack in early…
In today’s digital landscape, databases are the fortresses where an organization’s most valuable data assets are stored and managed. However, these digital vaults are constantly…
Poland’s Railway infrastructure, a crucial transit route for Western weapons transported to Ukraine, has been compromised by cybercriminals. The signals were intermingled with recordings of…
Hackers have taken to their dark web portals to announce a collaboration between hacktivist groups and cyber criminals, intending to initiate a series of cyber…
The rapid surge in LLMs (Large language models) across several industries and sectors has raised critical concerns about their safety, security, and potential for misuse.…
It has come to the attention of researchers that the LockBit 3.0 builder has suffered from a leak, which now allows anyone to create various…
A vulnerability in Skype mobile apps can be exploited by attackers to discover a user’s IP address – a piece of information that may endanger…
Aug 29, 2023The Hacker NewsVulnerability / Network Security Unpatched Citrix NetScaler systems exposed to the internet are being targeted by unknown threat actors in what’s…
FIN8-linked actor targets Citrix NetScaler systems Pierluigi Paganini August 29, 2023 A financially motivated actor linked to the FIN8 group exploits the CVE-2023-3519 RCE in…
Some cyberattacks are just more evasive than others. While many attacks can be identified and blocked through a system that relies on threat signatures, many…
To avoid detection, hackers employed a new method dubbed “MalDoc in PDF” to insert a malicious Word file into a PDF file. Despite having magic numbers…