Tag: Exploiting

Kraken Crypto Trade Hit by $3 Million Theft Exploiting Zero-Day Flaw

î ‚Jun 19, 2024î „NewsroomCybercrime / Crypto Safety Crypto alternate Kraken revealed that an unnamed safety researcher exploited an "extremely critical" zero-day flaw in its platform to...

Muhstik Botnet Exploiting Apache RocketMQ Flaw to Increase DDoS Assaults

î ‚Jun 06, 2024î „NewsroomBotnet / DDoS Assault The distributed denial-of-service (DDoS) botnet often called Muhstik has been noticed leveraging a now-patched safety flaw impacting Apache RocketMQ...

RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability

î ‚Might 30, 2024î „NewsroomVulnerability / Cryptocurrency The menace actors behind the RedTail cryptocurrency mining malware have added a lately disclosed safety flaw impacting Palo Alto Networks...

CISA warns of hackers exploiting Chrome, EoL D-Hyperlink bugs

The U.S. Cybersecurity & Infrastructure Safety Company (CISA) has added three safety vulnerabilities to its 'Recognized Exploited Vulnerabilities' catalog, one impacting Google Chrome and two...

Cybercriminals Exploiting Microsoft’s Fast Help Characteristic in Ransomware Assaults

î ‚Might 16, 2024î „NewsroomRansomware / Incident Response The Microsoft Risk Intelligence crew mentioned it has noticed a risk it tracks below the title Storm-1811 abusing the...

Hackers Exploiting LiteSpeed Cache Bug to Acquire Full Management of WordPress Websites

î ‚Could 08, 2024î „NewsroomNet Safety / Vulnerability A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by risk actors to create...
spot_imgspot_img

Subscribe

Popular articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

î ‚Jan 17, 2025î „Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...