Hackers Exploit Critical Flaw in Ghost Platform with Cryptojacking Attack
Hackers targeted Ghost on Sunday, in a cryptocurrency mining attack that caused widespread outages.
Hackers targeted Ghost on Sunday, in a cryptocurrency mining attack that caused widespread outages.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Cybersecurity researcher Mordechai Guri from Israel’s Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices. Dubbed ‘POWER-SUPPLaY,’ the latest research builds…
Days after cybersecurity researchers sounded the alarm over two critical vulnerabilities in the SaltStack configuration framework, a hacking campaign has already begun exploiting the flaws to breach servers of LineageOS, Ghost, and Digicert. Tracked as CVE-2020-11651 and CVE-2020-11652, the disclosed flaws could allow an adversary to execute arbitrary code on remote servers deployed in data…
The team behind the ransomware, first spotted in late 2014 and typically targeting Russian victims, apologized to victims in a post on GitHub.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Researchers warn that the EventBot Android malware, which targets over 200 financial apps, could be the “next big mobile malware.”
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Lessons from Facebook and Google show how to safely scale your environment for security.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Lessons from Facebook and Google show how to safely scale your environment for security.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Researchers say the bugs are easy to exploit and will likely be weaponized within a day.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The “PerSwaysion” attackers have leveraged a plethora of Microsoft services to compromise at least 150 executives in a highly targeted phishing campaign.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Threat actors are spreading the tricky trojan through fake messages in another opportunistic COVID-19-related campaign, said IBM X-Force.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea