Attacks on Linksys Routers Trigger Mass Password Reset
Linksys Smart Wi-Fi users were forced to reset their passwords after researchers discovered a router hack.
Linksys Smart Wi-Fi users were forced to reset their passwords after researchers discovered a router hack.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The DHS urged organizations to update their passwords and make sure that a critical Pulse Secure VPN flaw has been patched, as attackers continue to exploit the flaw.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The United States Cybersecurity and Infrastructure Security Agency (CISA) yesterday issued a fresh advisory alerting organizations to change all their Active Directory credentials as a defense against cyberattacks trying to leverage a known remote code execution (RCE) vulnerability in Pulse Secure VPN servers—even if they have already patched it. The warning comes three months after…
Cloud services have become increasingly important to many companies’ daily operations, and the rapid adoption of web apps has allowed businesses to continue operating with limited productivity hiccups, even as global coronavirus restrictions have forced much of the world to work from home. But at the same time, even major corporations have fallen prey to…
A never-before-seen RAT is targeting Azerbaijan energy companies with various tools aimed at stealing credentials and exfiltrating valuable data.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A honeypot experiment shows just how quickly cybercriminals will move to compromise vulnerable cloud infrastructure.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Cisco stomped out a critical vulnerability in its IP Phone web server that could enable remote code execution by an unauthenticated attacker.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
As developers increasingly embrace off-the-shelf software components into their apps and services, threat actors are abusing open-source repositories such as RubyGems to distribute malicious packages, intended to compromise their computers or backdoor software projects they work on. In the latest research shared with The Hacker News, cybersecurity experts at ReversingLabs revealed over 700 malicious gems…
The Coronavirus quarantine introduces an extreme challenge for IT and Security teams to maintain secure environments during the mass transition of employees working remotely and the surge in cyberattacks targeting its inherent security weaknesses. In a webinar for security service providers taking place on April 22nd (register here), a leading MSSP will share how they…
The United States agencies today released a joint advisory warning the world about the ‘significant cyber threat’ posed by North Korean state-sponsored hackers to the global banking and financial institutions. Besides a summary of recent cyberattacks attributed to North Korean hackers, the advisory—issued by U.S. Departments of State, the Treasury, and Homeland Security, and the…