LATEST

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

In order to create a botnet that can brute-force user passwords for services like FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers, a recent wave of GoBruteforcer attacks has target

Anthropic Launches Claude AI for Healthcare with Secure Health Record Access

Anthropic Launches Claude AI for Healthcare with Secure Health Record Access

The latest artificial intelligence (AI) company to reveal a new feature set that enables users of its Claude platform to comprehend their health data is Anthropic This article explores wel

Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

Two service providers that give online criminal networks the infrastructure and tools they need to support the pig butchering-as-a-service (PBaaS) economy have been identified by cybersecu

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

Threat actors who speak Chinese are suspected of using a compromised SonicWall VPN appliance as a first point of access to launch a VMware ESXi exploit that may have been created as early

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

To fix several security flaws affecting on-premise versions of Apex Central for Windows, including a serious flaw that could lead to arbitrary code execution, Trend Micro has released secu

CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024

CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024

Ten emergency directives (Eds) issued between 2019 and 2024 are being retired, the U.S This article explores emergency directives eds. . Cybersecurity and Infrastructure Security Agency (C

Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Updates for a medium-severity security vulnerability have been made available by Cisco This article explores vulnerability available cisco. . The licensing feature contains the vulnerabili

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform. The flaws could result in authentica

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

UAT-7290, a China-nexus threat actor, has been linked to espionage-focused intrusions against organizations in Southeastern Europe and South Asia This article explores attacks uat 7290. .

ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories

ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories

There is never a quiet moment on the internet This article explores escalation vulnerability windows. . There are new security issues, scams, and hacks every week.

The stories this

Top 5 this week

Page 186 of 202