Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining

26/07/2024 0 Comments 0 tags

Cybersecurity researchers are sounding the alarm over an ongoing campaign that’s leveraging internet-exposed Selenium Grid services for illicit cryptocurrency mining. Cloud security Wiz is tracking the activity under the name

Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk

26/07/2024 0 Comments 0 tags

Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical security flaw that could result in remote code execution. The vulnerability, tracked

North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

26/07/2024 0 Comments 0 tags

A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the deployment of ransomware, setting it apart from other nation-state hacking

Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

25/07/2024 0 Comments 0 tags

Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to target people with financial sextortion scams. “These included a smaller

6 Types of Applications Security Testing You Must Know About

25/07/2024 0 Comments 0 tags

While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy is essential for all three types. There are six core

Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform

25/07/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform’s Cloud Functions service that an attacker could exploit to access other services and sensitive data in an unauthorized

Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security

25/07/2024 0 Comments 0 tags

The browser is the nerve center of the modern workspace. Ironically, however, the browser is also one of the least protected threat surfaces of the modern enterprise. Traditional security tools

New Chrome Feature Scans Password-Protected Files for Malicious Content

25/07/2024 0 Comments 0 tags

Google said it’s adding new security warnings when downloading potentially suspicious and malicious files via its Chrome web browser. “We have replaced our previous warning messages with more detailed ones

CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software

25/07/2024 0 Comments 0 tags

The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could be

Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins

25/07/2024 0 Comments 0 tags

Docker is warning of a critical flaw impacting certain versions of Docker Engine that could allow an attacker to sidestep authorization plugins (AuthZ) under specific circumstances. Tracked as CVE-2024-41110, the