Conti ransomware operation is using the critical Log4Shell exploit to gain rapid access to internal VMware vCenter Server instances and encrypt virtual machines. The gang did...
Managing domain names is a task that enterprises often leave to the marketing department rather than the security team. Yet expired – or ‘dropped’ – domains...
The US Department of Homeland Security (DHS) has launched a bug bounty program inviting selected security researchers to test for vulnerabilities in its systems. Dubbed ‘Hack the DHS’,...
Threat actors are gearing up for the holidays with credit card skimming attacks remaining undetected for months as payment information is stolen from customers. Magecart skimming...
Researchers have spotted a new espionage hacking campaign targeting telecommunication and IT service providers in the Middle East and Asia. The campaign has been conducted over...
Threat actors and researchers are scanning for and exploiting the Log4j Log4Shell vulnerability to deploy malware or find vulnerable servers. In this article we have compiled...
Ethical hackers have reported over 66,000 valid vulnerabilities through HackerOne this year, an increase of 22% from 2020. The annual Hacker-Powered Security Report from bug bounty platform HackerOne, published on...
A sophisticated cybercrime group who has been quietly working from the shadows has had its tactics and procedures exposed by researchers who tracked recent cyberattacks conducted...
Open source data analytics and visualization platform Grafana is urging users to upgrade their deployments after a security researcher announced the discovery of a zero-day vulnerability on...
GOautodial, an open source call center software suite with 50,000 users around the world, has patched two vulnerabilities that could lead to information disclosure and remote...