FBI experts say that this year “sextortion” brought scammers more than $8 million
Experts from the FBI Internet Fraud Complaints Center (IC3) spoke about the activation of fraudsters in the field of the so-called "sextortion". To denote such activity, the term sextortion is…
Atlassian Confluence vulnerability was exploited to install miners
In late August, Atlassian released a hotfix for a Confluence Remote Code Execution (RCE) vulnerability. The issue has ID CVE-2021-26084 and allows an unauthenticated attacker to remotely execute commands on…
Dangerous bug in WhatsApp could lead to disclosure of user data
Check Point specialists spoke about a dangerous bug they discovered in the WhatsApp image processing function, which could lead to the disclosure of user data. The problem helped to disable…
BrakTooth vulnerabilities threaten billions of devices around the world
A group of researchers has published information on 16 serious vulnerabilities, dubbed BrakTooth, which threaten billions of devices around the world. Vulnerabilities affect the Bluetooth stack in many popular SoCs…
Researchers spot a tool to hide malware in AMD and Nvidia GPUs for sale
Bleeping Computer discovered that an exploit that uses the memory buffer of AMD and Nvidia GPUs to store malware and execute it, appeared for sale on a hacker forum. In…
ProxyToken Vulnerability Allows Stealing Mail Through Microsoft Exchange
A dangerous vulnerability called ProxyToken has been discovered in Microsoft Exchange. An attacker can exploit this problem by making requests to the Exchange Control Panel (ECP) web services and stealing…
Microsoft warned of a critical vulnerability in Cosmos DB
Microsoft has warned thousands of Azure customers of a critical Cosmos DB vulnerability. The bug allows any user remote database management, and grants administrator rights without the need for authorization.…
LockFile ransomware adopts ProxyShell and PetitPotam vulnerabilities
The new LockFile ransomware exploits recently discovered ProxyShell and PetitPotam vulnerabilities to increase its chances of hacking and encrypting corporate networks. Experts from TG Soft and well-known information security researcher…
Over 2000 Exchange Servers Hacked Using ProxyShell Exploit
Researchers at Huntress Labs estimate that over the past few days, about 2,000 Microsoft Exchange mail servers have been compromised and infected with backdoors, because their owners have not installed…
Experts list 15 most attacked Linux vulnerabilities
Trend Micro has published a list of the top threats and most attacked vulnerabilities for Linux in the first half of 2021. The results were obtained from honeypots, sensors and…
Due to Razer Synapse vulnerability, connecting a mouse to a Windows machine gives system privileges
A security researcher known as jonhat discovered a 0-day vulnerability in Razer Synapse, thanks to which user can gain Windows administrator rights by simply connecting a Razer mouse or keyboard…
Attackers hacked the US Census Bureau using Citrix exploit
The Office of the Inspector General (OIG) reported that unknown attackers hacked the servers of the US Census Bureau on January 11, 2020. To do this, a zero-day Citrix ADC…