Atlassian Confluence bug CVE-2022-26134 exploited in cryptocurrency mining campaign
Threat actors are targeting unpatched Atlassian Confluence servers as part of an ongoing crypto mining campaign. Trend Micro researchers warn...
Threat actors are targeting unpatched Atlassian Confluence servers as part of an ongoing crypto mining campaign. Trend Micro researchers warn...
A disgruntled developer seems to be responsible for the leak of the builder for the latest encryptor of the LockBit...
Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Threat actors targeted tens thousands of unauthenticated Redis servers exposed on the internet as part of a cryptocurrency campaign. Redis,...
Threat actors have stolen around $160 million worth of digital assets worth from crypto trading firm Wintermute. Malicious actors continue to...
The U.S. Federal Communications Commission (FCC) has added more Chinese telecom firms to the Covered List. The U.S. Federal Communications...
Cybersecurity company Imperva announced to have mitigated a distributed denial-of-service (DDoS) attack with a total of over 25.3 billion requests....
Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack...
Our research examines the security flaws that we found in the logistics API implementation of e-commerce platforms that can potentially...
Russia-linked APT group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware. Russia-linked cyberespionage group Sandworm...
U The UK and international allies have issued a joint cyber security advisory highlighting that cyber actors affiliated with Iran’s...
Uber disclosed additional details about the security breach, the company blames a threat actor allegedly affiliated with the LAPSUS$ hacking...
How can businesses protect themselves from fraudulent activities by examining IP addresses? The police would track burglars if they left...
American Airlines disclosed a data breach, threat actors had access to an undisclosed number of employee email accounts. American Airlines recently suffered...
VMware and Microsoft are warning of a widespread Chromeloader malware campaign that distributes several malware families. ChromeLoader is a malicious...
To prevent a cyberattack, it is vital to know what the attack surface for your organization is. To be prepared...
Revolut has suffered a cyberattack, threat actors have had access to personal information of tens of thousands of customers. The financial...
Threat actors leaked source code and gameplay videos of Grand Theft Auto 6 (GTA6) after they have allegedly breached Rockstar...
AquaSec researchers observed the cybercrime gang TeamTNT hijacking servers to run Bitcoin solver since early September. In the first week...
Researchers discovered two critical vulnerabilities (CVE–2022–36158 and CVE–2022–36159) in Flexlan devices that provide WiFi on airplanes. Researchers from Necrum Security...
Multiple Netgear router models are impacted by an arbitrary code execution via FunJSQ, which is a third-party module for online...
Uber hack update: There is no evidence that users’ private information was compromised in the data breach. Uber provided an...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...