admin

SonicWall releases urgent fix for crucial firewall flaw allowing unauthorized access

SonicWall Addresses Critical Flaw in Firewalls with Security Updates SonicWall, a prominent player in the cybersecurity industry, recently pushed out security updates aimed at mitigating a critical vulnerability affecting its firewalls. This flaw, identified as CVE-2024-40766 with a high CVSS score of 9.3, poses a significant risk by potentially allowing unauthorized access to the impacted…

Read More

Unpacking Slack Hacks: 6 Strategies for Securing Sensitive Data in Collaborative Environments

Disney’s Data Breach: A Wake-Up Call for Enhanced Security Measures In a digital era where sensitive and critical data are constantly circulating through everyday business channels, the importance of robust security measures cannot be overstated. The recent data breach at Disney serves as a stark reminder of the potential consequences of lax security protocols. NullBulge,…

Read More

Research unveils more than 20 Supply Chain Weaknesses in MLOps Platforms

Cybersecurity Researchers Warn of Machine Learning Software Supply Chain Risks Cybersecurity researchers have raised red flags on the security risks within the machine learning (ML) software supply chain. They have identified over 20 vulnerabilities that could potentially be exploited to target MLOps platforms, indicating a pressing need for enhanced security measures in this domain. These…

Read More

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

Traccar GPS Tracking System Vulnerabilities Overview Two critical security vulnerabilities have recently been uncovered within the Traccar open-source GPS tracking system. These vulnerabilities could pose a significant risk, potentially allowing unauthorized parties to carry out remote code execution on affected systems. It is crucial for users of the Traccar system to be aware of these…

Read More

NUMOZYLOD Malware izkorišča MSIX namestitvenike za izvajanje nevarne kodep

Recentna kampanja zlonamerne programske opreme z uporabo trojaniziranih MSIX installerjev Znano je, da so zlonamerne kampanje vedno bolj usmerjene v čim bolj prikrite metode napada, katerih cilj je velika skupnost nič hudega slutečih uporabnikov. V recentno odkriti kampanji je bil zaznan porast trojaniziranih MSIX installerjev, ki ciljajo uporabnike, ki iščejo poslovno programsko opremo. Zlonamerna skupina…

Read More

Unveiling NGate: The Android Malware That’s Cloning Contactless Payment Cards

Cybersecurity researchers discover new Android malware targeting contactless payment data In recent news, cybersecurity experts have detected a new strain of malware designed to steal contactless payment information from physical credit and debit cards using Android devices. This devious malware allows attackers to intercept victims’ payment data and transfer it to a device under their…

Read More

Unveiling the Stealthy Linux Malware ‘sedexp’ Concealing Credit Card Skimmers with Udev Rules

The Stealthy Linux Malware Sedexp Unveiled Cybersecurity experts have recently unearthed an insidious new strain of Linux malware known as sedexp. This malicious software employs a rather unorthodox method to secure its position on compromised devices while discreetly concealing credit card skimmer code. The discovery of this malware was credited to the vigilant efforts of…

Read More

MegaMedusa: Orodje DDoS, ki v svetu hekerjev vzbuja vihar

Pro-palestinska in pro-muslimanska hektivistična skupina RipperSec dosega nove “mege” kibernetske napade s svojim orodjem MegaMedusa Pro-palestinska in pro-muslimanska malezijska hektivistična skupina RipperSec, ustanovljena junija 2023, je na svojem Telegram kanalu zbrala več kot 2.000 naročnikov. RipperSec sodeluje z mednarodnimi skupinami, kot so Tengkorak Cyber Crew in Stucx Team, in se ukvarja s kibernetskimi napadi, kot…

Read More

Hekerja so izkoristili slabo konfigurirane AWS .env datoteke za napade na 110.000 domen.

Oblak na udaru: Hekerji izkoristili napačno konfigurirane AWS .env datoteke za obsežne napade Napadalci so izkoristili izpostavljene okoljske spremenljivke v napačnih konfiguracijah AWS .env datotek, da so zaklenili podatke, shranjene v S3 vsebnikih. S pomočjo avtomatizacije so ciljali na več kot 100.000 domen. Varnostni neuspehi opozarjajo na pomembnost robustne avtentikacije Njihov uspeh je bil posledica…

Read More

Kitajski hekerji izkoriščajo danes najbolj ranljive ranljivosti

Napaka v računalniški varnosti: Kitajski hackerji izkoriščajo zero-day napake V zadnjih dneh so kitajski hackerji odkrili in izkoriščali zero-day napake v računalniških sistemih, kar predstavlja veliko grožnjo za uporabnike. Zero-day napake so napake, ki še niso znane in niso objavljene, kar pomeni, da jih ni mogoče preprečiti z uporabo standardnih varnostnih programov. Razkritje ranljivosti Napake…

Read More