CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

09/03/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active

Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets

09/03/2024 0 Comments 0 tags

Microsoft on Friday revealed that the Kremlin-backed threat actor known as Midnight Blizzard (aka APT29 or Cozy Bear) managed to gain access to some of its source code repositories and internal systems

Meta Details WhatsApp and Messenger Interoperability to Comply with EU’s DMA Regulations

09/03/2024 0 Comments 0 tags

Meta has offered details on how it intends to implement interoperability in WhatsApp and Messenger with third-party messaging services as the Digital Markets Act (DMA) went into effect in the

Ex-Google Engineer Arrested for Stealing AI Technology Secrets for China

07/03/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) announced the indictment of a 38-year-old Chinese national and a California resident of allegedly stealing proprietary information from Google while covertly working for two

New Python-Based Snake Info Stealer Spreading Through Facebook Messages

07/03/2024 0 Comments 0 tags

Facebook messages are being used by threat actors to a Python-based information stealer dubbed Snake that’s designed to capture credentials and other sensitive data. “The credentials harvested from unsuspecting users

Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware

07/03/2024 0 Comments 0 tags

Threat actors have been leveraging fake websites advertising popular video conferencing software such as Google Meet, Skype, and Zoom to deliver a variety of malware targeting both Android and Windows

Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks

07/03/2024 0 Comments 0 tags

Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal. The attacks, which take the form of distributed brute-force attacks, “target

Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks

07/03/2024 0 Comments 0 tags

The China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting Tibetan users at least since September 2023. The end of the attacks is to deliver

Human vs. Non-Human Identity in SaaS

07/03/2024 0 Comments 0 tags

In today’s rapidly evolving SaaS environment, the focus is on human users. This is one of the most compromised areas in SaaS security management and requires strict governance of user

Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining

06/03/2024 0 Comments 0 tags

Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part of an emerging malware campaign designed to deliver a cryptocurrency