attackers

  1. Tomcat

    Attackers can gain full remote access to an Android device via a public USB charging port

    With the advent of USB devices and USB ports in our lives, one of the main security requirements has become careful attention to connection points that are capable of transferring data between devices. Actually, for this reason, in the Android OS from the earliest versions (from 2.0 exactly)...
  2. Teacher

    NHS Dumfries & Galloway: 3 TB of medical data permanently stolen by attackers

    Hackers are putting all the pressure on the organization to accurately get a cash ransom. This month, the UK's National Health Service (NHS), and more specifically its NHS Dumfries & Galloway division, serving the Dumfries and Galloway region of Scotland, was hit by a major cyberattack claimed...
  3. Brother

    Adaptive phishing turns off the vigilance of victims: what techniques are used by attackers

    Personalized attacks reach a whole new level. In the world of cybersecurity, a new threat is gaining momentum — adaptive phishing campaigns. This method is an evolution of traditional phishing: attackers use a personalized approach to overcome defenses, using victim information gathered from...
  4. Brother

    Hadoop and Flink become targets for cryptojacking: What vulnerabilities do attackers use to attack

    Aqua Security reveals weaknesses in popular Apache products. Cybersecurity researchers have discovered a new type of attack that exploits flaws in the configuration of Apache's Hadoop and Flink software for deploying cryptocurrency miners to target systems. "This attack is particularly...
  5. Brother

    Amazon on Fire: how temporary tokens have become a new weapon in the hands of attackers

    Even multi-factor authentication doesn't help. Is it possible to secure your systems? Red Canary cybersecurity researchers Thomas Gardner and Cody Betsworth found that attackers can use the Security Token Service (STS) in Amazon Web Services (AWS) to break into cloud accounts and conduct...
  6. Carding 4 Carders

    Critical bug in the Linux subsystem: attackers can remotely control your server

    A logical error was detected in NVMe-oF / TCP, which gives full access to the system. A vulnerability identified as CVE-2023-5178 has been identified in the Linux subsystem known as nvmet-tcp (NVMe-oF/TCP), which is designed to access NVMe drives over a network using the TCP protocol. The...
  7. Carding 4 Carders

    Critical vulnerability in Cisco products: attackers gain full control over the network

    Find out if your network is secure. Cisco strongly recommends that its customers secure their devices after discovering a critical vulnerability that is currently being actively exploited by attackers, giving them full administrative control over their networks. Successful exploitation of this...
  8. Carding

    Attackers secretly injected a skimmer into Everlast's official website

    The payment details of hundreds of thousands of people have been stolen, but the threat has not yet been eliminated. The well-known American sports equipment brand Everlast, which specializes in boxing and mixed martial arts products, has been subjected to a cyberattack. Hackers from a group...
  9. Tomcat

    FBI will help companies create "false data" to deceive attackers

    The IDLE program will act as the basic security system for companies. The FBI has launched the Illicit Data Loss Exploitation (IDLE) program to help companies reduce the damage from data theft. Under the new program, companies will deploy "false information" to trick intruders and corporate...
  10. Tomcat

    Vulnerability allows attackers to eavesdrop and intercept VPN connections

    Researchers at the University of New Mexico have discovered a vulnerability affecting Ubuntu, Fedora, Debian, FreeBSD, OpenBSD, macOS, iOS Android, and other Unix-based operating systems. The problem allows you to eavesdrop, intercept and interfere with the operation of VPN connections. The...
Top