From Megabits to Terabits: Gcore Radar Warns of a New Era of DDoS Attacks

24/01/2024 0 Comments 0 tags

As we enter 2024, Gcore has released its latest Gcore Radar report, a twice-annual publication in which the company releases internal analytics to track DDoS attacks. Gcore’s broad, internationally distributed

BreachForums Founder Sentenced to 20 Years of Supervised Release, No Jail Time

24/01/2024 0 Comments 0 tags

Conor Brian Fitzpatrick has been sentenced to time served and 20 years of supervised release for his role as the creator and administrator of BreachForums. Fitzpatrick, who went by the

~40,000 Attacks in 3 Days: Critical Confluence RCE Under Active Exploitation

24/01/2024 0 Comments 0 tags

Malicious actors have begun to actively exploit a recently disclosed critical security flaw impacting Atlassian Confluence Data Center and Confluence Server, within three days of public disclosure. Tracked as CVE-2023-22527

Apple Issues Patch for Critical Zero-Day in iPhones, Macs – Update Now

23/01/2024 0 Comments 0 tags

Apple on Monday released security updates for iOS, iPadOS, macOS, tvOS, and Safari web browser to address a zero-day flaw that has come under active exploitation in the wild. The

FTC Bans InMarket for Selling Precise User Location Without Consent

23/01/2024 0 Comments 0 tags

The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by prohibiting InMarket Media from selling or licensing precise location data. The settlement is part of

North Korean Hackers Weaponize Fake Research to Deliver RokRAT Backdoor

23/01/2024 0 Comments 0 tags

Media organizations and high-profile experts in North Korean affairs have been at the receiving end of a new campaign orchestrated by a threat actor known as ScarCruft in December 2023. “ScarCruft has

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries

23/01/2024 0 Comments 0 tags

Several public and popular libraries abandoned but still used in Java and Android applications have been found susceptible to a new software supply chain attack method called MavenGate. “Access to

52% of Serious Vulnerabilities We Find are Related to Windows 10

23/01/2024 0 Comments 0 tags

We analyzed 2,5 million vulnerabilities we discovered in our customer’s assets. This is what we found. Digging into the data The dataset we analyze here is representative of a subset

NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers

23/01/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new Java-based “sophisticated” information stealer that uses a Discord bot to exfiltrate sensitive data from compromised hosts. The malware, named NS-STEALER, is propagated via ZIP archives

Apache ActiveMQ Flaw Exploited in New Godzilla Web Shell Attacks

22/01/2024 0 Comments 0 tags

Cybersecurity researchers are warning of a “notable increase” in threat actor activity actively exploiting a now-patched flaw in Apache ActiveMQ to deliver the Godzilla web shell on compromised hosts. “The