IKEA is fighting a hack in which threat actors are utilising stolen reply-chain emails to target employees in internal phishing assaults. Threat actors...
Blog
Want to Pursue a Career in Cyber Security in 2022? Four Things You Must Know!
With the increased focus on ransomware attacks and cyber-physical systems, more businesses are giving priority to risk leaders and security. After the...
Lookout Discovers a Global Campaign: Rooting Malware Makes a Comeback
The Lookout Threat Lab has discovered a new rooting malware that is available on Google Play as well as popular third-party stores like the Amazon...
CVE-2021-22205: GitLab Unauthenticated Remote Code Execution in the Wild
GitLab released a security update on April 14, 2021, to address CVE-2021-22205, a severe remote code execution vulnerability in the web interface. GitLab...
Pink was a botnet that contended with the vendor for control of the infected devices’ large numbers.
The majority of the following essay was written in early 2020, while the vendor was attempting to recover a significant number of infected devices. We...
Japanese Gamers Are Destroyed by a Chaos Ransomware Variant Found in a Fake Minecraft Alt List
The Posting of a Ransomware Lure on Japanese Minecraft ForumsGamers create "alt" (alternative) accounts in Minecraft for a variety of reasons (both good...
Infiltrating Windows: Infostealer Malware Disguised as a Windows Program
To detect and remediate threats, Rapid7's Managed Detection and Response (MDR) team uses specialised tools, malware analysis, tradecraft, and...
Pentaho Business Analytics Software Has Critical Flaws
Malicious actors might exploit multiple vulnerabilities in Hitachi Vantara's Pentaho Business Analytics software to upload arbitrary data files and...
Positive Technologies demonstrates how Diebold Nixdorf ATMs may be hacked.
The majority of prior versions of ATMs were vulnerable to black-box assaults. In such attacks, a hacker connects to the ATM via a computer or a mobile...