New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

18/01/2024 0 Comments 0 tags

Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying XMRig cryptocurrency miner as well as the 9Hits Viewer software as part of

Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts

18/01/2024 0 Comments 0 tags

High-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the U.K., and the U.S. have been targeted by an Iranian cyber espionage

PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft

18/01/2024 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation of the Unified Extensible Firmware Interface (UEFI) specification used widely in modern computers.

MFA Spamming and Fatigue: When Security Measures Go Wrong

18/01/2024 0 Comments 0 tags

In today’s digital landscape, traditional password-only authentication systems have proven to be vulnerable to a wide range of cyberattacks. To safeguard critical business resources, organizations are increasingly turning to multi-factor

TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks

18/01/2024 0 Comments 0 tags

Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow machine learning framework could have been exploited to orchestrate supply chain attacks. The misconfigurations could be abused by an attacker to

Zero-Day Alert: Update Chrome Now to Fix New Actively Exploited Vulnerability

17/01/2024 0 Comments 0 tags

Google on Tuesday released updates to fix four security issues in its Chrome browser, including an actively exploited zero-day flaw. The issue, tracked as CVE-2024-0519, concerns an out-of-bounds memory access

Citrix, VMware, and Atlassian Hit with Critical Flaws — Patch ASAP!

17/01/2024 0 Comments 0 tags

Citrix is warning of two zero-day security vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) that are being actively exploited in the wild. The flaws

GitHub Rotates Keys After High-Severity Vulnerability Exposes Credentials

17/01/2024 0 Comments 0 tags

GitHub has revealed that it has rotated some keys in response to a security vulnerability that could be potentially exploited to gain access to credentials within a production container. The

New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone

17/01/2024 0 Comments 0 tags

Cybersecurity researchers have identified a “lightweight method” called iShutdown for reliably identifying signs of spyware on Apple iOS devices, including notorious threats like NSO Group’s Pegasus, QuaDream’s Reign, and Intellexa’s Predator.  Kaspersky, which analyzed a

Webinar: The Art of Privilege Escalation – How Hackers Become Admins

17/01/2024 0 Comments 0 tags

In the digital age, the battleground for security professionals is not only evolving, it’s expanding at an alarming rate. The upcoming webinar, “The Art of Privilege Escalation – How Hackers