Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds

29/03/2024 0 Comments 0 tags

Security vulnerabilities discovered in Dormakaba’s Saflok electronic RFID locks used in hotels could be weaponized by threat actors to forge keycards and stealthily slip into locked rooms. The shortcomings have

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

29/03/2024 0 Comments 0 tags

A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless.

The Golden Age of Automated Penetration Testing is Here

29/03/2024 0 Comments 0 tags

Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited. The current method of performing pen testing is pricey, leading many companies to undertake it only

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

29/03/2024 0 Comments 0 tags

Details have emerged about a vulnerability impacting the “wall” command of the util-linux package that could be potentially exploited by a bad actor to leak a user’s password or alter

PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers

29/03/2024 0 Comments 0 tags

The maintainers of the Python Package Index (PyPI) repository briefly suspended new user sign-ups following an influx of malicious projects uploaded as part of a typosquatting campaign. It said “new project creation

Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries

28/03/2024 0 Comments 0 tags

A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild targeting China, Taiwan, Turkey, and Uzbekistan, new findings from Kaspersky reveal. DinodasRAT, also known as XDealer, is a C++-based

Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack

28/03/2024 0 Comments 0 tags

The Police of Finland (aka Poliisi) has formally accused a Chinese nation-state actor tracked as APT31 for orchestrating a cyber attack targeting the country’s Parliament in 2020. The intrusion, per

Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection

28/03/2024 0 Comments 0 tags

A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organizations in over 100 countries by leveraging a massive network of more than 20,000 counterfeit domains to help cyber criminals

New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5

28/03/2024 0 Comments 0 tags

Considering the ever-changing state of cybersecurity, it’s never too late to ask yourself, “am I doing what’s necessary to keep my organization’s web applications secure?” The continuous evolution of technology

Behind the Scenes: The Art of Safeguarding Non-Human Identities

28/03/2024 0 Comments 0 tags

In the whirlwind of modern software development, teams race against time, constantly pushing the boundaries of innovation and efficiency. This relentless pace is fueled by an evolving tech landscape, where