/f/threats

CISA warns of hackers exploiting ZK Java Framework RCE flaw _bleepingcomputer.com
| posted in rouiejay12 No comments |
1

Indian transport ministry flaws potentially allowed creation of counterfeit driving licenses _portswigger.net
| posted in rouiejay12 No comments |
1

CISA: Beware of DDoS, Web Defacements on Anniversary of Russian Invasion of Ukraine _darkreading.com
| posted in rouiejay12 No comments |
1

Chromium bug allowed SameSite cookie bypass on Android devices _portswigger.net
| posted in rouiejay12 No comments |
1

ChromeLoader campaign uses VHD files disguised as cracked games and pirated software _securityaffairs.com
| posted in rouiejay12 No comments |
1

Critical vulnerabilities hidden in hundreds of popular open source containers _scmagazine.com
| posted in rouiejay12 No comments |
1

Beware rogue 2FA apps in App Store and Google Play – don’t get hacked! _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

Defenders on high alert as backdoor attacks become more common _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Stealthy Mac Malware Delivered via Pirated Apps _securityweek.com
| posted in rouiejay12 No comments |
1

Fake ChatGPT apps spread Windows and Android malware _tripwire.com
| posted in rouiejay12 No comments |
1

Stealc, a new advanced infostealer appears in the threat landscape _securityaffairs.com
| posted in rouiejay12 No comments |
1

Report: Overwhelming majority of codebases have open source vulnerabilities, half deemed high-risk _scmagazine.com
| posted in rouiejay12 No comments |
1

Hackers Ran Amok Inside GoDaddy for Nearly 3 Years _wired.com
| posted in rouiejay12 No comments |
1

Researchers warn of 'Havoc' command and control tool _theregister.com
| posted in rouiejay12 No comments |
1

Crypto Buyers Beware: 1 in 4 New Tokens of Any Value Is a Scam _wired.com
| posted in rouiejay12 No comments |
1

High-risk users may be few, but the threat they pose is huge _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

BEC groups are using Google Translate to target high value victims _csoonline.com
| posted in rouiejay12 No comments |
1

Dragos Report Identifies Two New Threat Groups _itsecurityguru.org
| posted in rouiejay12 No comments |
1

Pig Butchering Scams Are Evolving Fast _wired.com
| posted in rouiejay12 No comments |
1

Enigma, Vector, and TgToxic: The New Threats to Cryptocurrency Users _thehackernews.com
| posted in rouiejay12 No comments |
1

Microsoft OneNote Abuse for Malware Delivery Surges _securityweek.com
| posted in rouiejay12 No comments |
1

Flaws in industrial wireless IoT solutions can give attackers deep access into OT networks _csoonline.com
| posted in rouiejay12 No comments |
1

AWS malvertising campaign a “potent threat” to users, researchers warn _itpro.com
| posted in rouiejay12 No comments |
1

The Medusa botnet returns as a Mirai-based variant _en.secnews.gr
| posted in rouiejay12 No comments |
1

Exploit Released for GoAnywhere File Transfer Zero-Day Flaw _gbhackers.com
| posted in rouiejay12 No comments |
1

Attackers increasingly use Microsoft’s OneNote to deliver QakBot malware _scmagazine.com
| posted in rouiejay12 No comments |
1

FormBook Malware Spreads via Malvertising Using MalVirt Loader to Evade Detection _thehackernews.com
| posted in rouiejay12 No comments |
1

OpenSSF Head Delivers AI Warning for Application Security _securityboulevard.com
| posted in rouiejay12 No comments |
1

Nevada Ransomware has released upgraded locker _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Legacy VMware Bug Exploited in Global Ransomware Campaign _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Serious security hole plugged in infosec tool binwalk _portswigger.net
| posted in rouiejay12 No comments |
1

Prilex POS malware evolves to block contactless transactions _techrepublic.com
| posted in rouiejay12 No comments |
1

GoAnywhere MFT Users Warned of Zero-Day Exploit _securityweek.com
| posted in rouiejay12 No comments |
1

Remote code execution exploit chain available for VMware vRealize Log Insight _csoonline.com
| posted in rouiejay12 No comments |
1

Cybercrime groups offer six-figure salaries, bonuses, paid time off to attract talent on dark web _cyberscoop.com
| posted in rouiejay12 No comments |
1

Ordered Something From JD Sports? Hackers Might Have Your Data. _sea.mashable.com
| posted in rouiejay12 No comments |
1

UNC2565 threat actors continue to improve the GOOTLOADER malware _securityaffairs.com
| posted in rouiejay12 No comments |
1

Serious Security: The Samba logon bug caused by outdated crypto _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

Titan Stealer: A New Golang-Based Information Stealer Malware Emerges _thehackernews.com
| posted in rouiejay12 No comments |
1

VMware vRealize Log Contains Critical Vulnerabilities (CVE-2022-31706) _sensorstechforum.com
| posted in rouiejay12 No comments |
1