/f/threats

Many Vulnerabilities Found in PrinterLogic Enterprise Software _securityweek.com
| posted in rouiejay12 No comments |
1

Inactive, unmaintained Salesforce sites vulnerable to threat actors _csoonline.com
| posted in rouiejay12 No comments |
1

Dark Pink APT Group Expands Tooling and Targets _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

New Phishing Kit: File Archivers in the Browser _heimdalsecurity.com
| posted in rouiejay12 No comments |
1

CISA: Warns federal agencies about recent Barracuda zero-day bug _en.secnews.gr
| posted in rouiejay12 No comments |
1

New York county still dealing with ransomware 8 months later _theregister.com
| posted in rouiejay12 No comments |
1

CosmicEnergy malware poses ‘plausible threat’ to electric grids, researchers warn _scmagazine.com
| posted in rouiejay12 No comments |
1

Rogue IT security worker failed to cover his tracks _tripwire.com
| posted in rouiejay12 No comments |
1

The Real Risks in Google’s New .Zip and .Mov Domains _wired.com
| posted in rouiejay12 No comments |
1

Legion Malware Upgraded to Target SSH Servers and AWS Credentials _thehackernews.com
| posted in rouiejay12 No comments |
1

Malicious links and misaddressed emails slip past security controls _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Take action now to avoid BianLian ransomware attacks, US Government warns organisations _tripwire.com
| posted in rouiejay12 No comments |
1

Keeper Password Vulnerability Let Hackers Gain the Master Password _gbhackers.com
| posted in rouiejay12 No comments |
1

Apple warns of three WebKit vulns under active exploitation _theregister.com
| posted in rouiejay12 No comments |
1

Developer Alert: NPM Packages for Node.js Hiding Dangerous TurkoRat Malware _thehackernews.com
| posted in rouiejay12 No comments |
1

Royal ransomware is rapidly expanding its reign _en.secnews.gr
| posted in rouiejay12 No comments |
1

Latest variant of RapperBot botnet adds cryptojacking capabilities _securityaffairs.com
| posted in rouiejay12 No comments |
1

Cactus Ransomware Infiltrates Networks by Exploiting VPN Flaws _heimdalsecurity.com
| posted in rouiejay12 No comments |
1

CVE-2018-9995 in TBK Devices Exploited in the Wild _sensorstechforum.com
| posted in rouiejay12 No comments |
1

LOBSHOT: a Covert, Info-Stealing Malware on the Loose _sensorstechforum.com
| posted in rouiejay12 No comments |
1

WordPress bug threatens 2 million websites _cybernews.com
| posted in rouiejay12 No comments |
1

"Kekw" Malware in Python Packages Could Steal Data and Hijack Crypto _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Kimsuky hackers are using new version of ReconShark malware _en.secnews.gr
| posted in rouiejay12 No comments |
1

Hacked verified Facebook pages impersonating Meta are buying ads from Meta _techcrunch.com
| posted in rouiejay12 No comments |
1

New SLP DDoS amplification can overload your network _senki.org
| posted in Mario No comments |
1

Abnormal Security expands threat protection to Slack, Teams and Zoom _csoonline.com
| posted in rouiejay12 No comments |
1

New SLP Vulnerability Could Enable Massive DDoS Attacks _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Attackers using AI to enhance conversational scams over mobile devices _scmagazine.com
| posted in rouiejay12 No comments |
1

Why is ‘Juice Jacking’ Suddenly Back in the News? _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

Google Play threats on the dark web are big business _techrepublic.com
| posted in rouiejay12 No comments |
1

New hacker advocacy group seeks to protect work of security researchers _cyberscoop.com
| posted in rouiejay12 No comments |
1

RTM Locker, a new RaaS gains notorieties in the threat landscape _securityaffairs.com
| posted in rouiejay12 No comments |
1

Attention gamers! Motherboard maker MSI admits to breach, issues “rogue firmware” alert _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

STALKER 2 hacker demands Ukrainian game developer reinstates Russian language support, or else… _grahamcluley.com
| posted in rouiejay12 No comments |
1

Secret Service and ICE break the law with fake phone towers _theregister.com
| posted in rouiejay12 No comments |
1

Feds warn about right Royal ransomware rampage that runs the gamut of TTPs _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

Attackers are developing and deploying exploits faster than ever _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Iron Tiger updates malware to target Linux platform _csoonline.com
| posted in rouiejay12 No comments |
1

New Backdoor MQsTTang Attributed to Mustang Panda Group _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Alarming Rise in Mobile Banking Malware - Over 200,000 New Installers Discovered _gbhackers.com
| posted in rouiejay12 No comments |
1