How well is the vulnerability exploit business booming?
Details on the parallel economy of vulnerability exploits on underground forums occasionally emerge from private talks, indicating just how deep certain threat actors' pockets are.
Some adversaries claim to have multi-million dollar...
Twitter has stopped opening AMP links on iOS and Android
According to a support page noticed by SEO consultant Christian Oliveira, Twitter has silently withdrawn support for Accelerated Mobile Pages (AMP) on mobile. The support page initially described how Twitter's mobile...
New variant of Joker spreading across the Play Store
A new batch of Joker malware variants has been identified spreading via the Play Store. These variations employ clever tactics to circumvent detection by Google's malware detection engine.
The new variations were...
Malware based on Golang is getting more popular
Threats based on Golang are on the rise. This unusual language is increasingly being used by cybercriminals to further their financial and espionage goals. Golang's adaptability allows threat actors to cross-compile...
WordPress Websites Are Constantly Under Attack
WordPress sites have recently been subjected to a slew of cyber-threats. The consensus is that WordPress isn't having a good time, whether it's because of site takeovers or plugin vulnerabilities.
Last week,...
A Cyberattack on a Missouri’s official entities, compromised some sensitive data
Missouri's Office of Administration Information Technology Services Division (OA-ITSD) and the Department of Environmental Quality (DESE) will send letters to those who have been affected, informing them that their personally identifiable...
Aruba Central, a data repository, was found to be hacked
HPE has revealed that data repositories for its Aruba Central network monitoring technology have been hacked, allowing a threat actor to gain access to collected data on monitored devices and their...
Multiple Ransomware gangs were found to have access to Zebra2104
Zebra2104 gives initial access to ransomware organisations MountLocker and Phobos, as well as the StrongPity APT, according to BlackBerry Research & Intelligence.
The broker has aided crooks in breaking into the networks...
A bug on Palo Alto VPN can be exploited network based attackers
Palo Alto Networks GlobalProtect VPN has a new zero-day vulnerability that could be exploited by an unauthenticated network-based attacker to execute arbitrary code with root user rights on affected devices.
The security...
App developers now have more free data access thanks to Twitter
Twitter Inc announced on Monday that it will make its data available to software developers for free in order to assist them to create tools and businesses that encourage safer online...