SonicWall has announced that the operators of the Akira ransomware exploited an old vulnerability in recent attacks on 7th-generation SonicWall firewalls with SSL VPN enabled. It was previously believed that the attackers were using a zero-day vulnerability.
CONTINUE READING 🡒 150 Firefox Extensions Found to Have Stolen Over $1 Million…
Analysts at Koi Security discovered the malicious GreedyBear campaign, which is active in the Mozilla add-ons store. 150 malicious Firefox extensions have stolen cryptocurrency worth over $1 million from users.
CONTINUE READING 🡒 Unlocking the Secret Features of DuckDuckGo: Unique Tools You Won’t…
If people are familiar with the search engine DuckDuckGo, it's primarily due to its enhanced privacy features. Unlike Google or Yandex, it doesn't collect user data, but its search results aren't as strong. However, if you dig…
CONTINUE READING 🡒 ReVault Vulnerabilities Allow Bypassing Windows Login on Dell Laptops
Vulnerabilities in the ControlVault3 firmware affect over 100 Dell laptop models, allowing attackers to bypass Windows Login and install malware that remains on the system even after an OS reinstallation.
CONTINUE READING 🡒 Adobe Releases Emergency Patches for AEM Forms
Adobe has released emergency patches that address two critical vulnerabilities in Adobe Experience Manager Forms (AEM Forms) in Java Enterprise Edition (JEE), for which public exploits are already available.
CONTINUE READING 🡒 Conducting a Wi-Fi Security Audit Using a Smartphone with Kali…
Wardriving can be effectively conducted using a smartphone, but the built-in radio module and Android apps are often insufficient for advanced attacks. Instead, external Wi-Fi adapters and console programs for Linux are typically used. All the necessary…
CONTINUE READING 🡒 WhatsApp Introduces a New Feature to Protect Against Scammers
The developers of WhatsApp have introduced a new security feature that will help users identify potential scammers when someone not in their contact list invites them to a group chat.
CONTINUE READING 🡒 Google Data Breach Occurs Due to Salesforce Hack
Google reports that it has suffered a data breach. This incident is the latest attack by the hacker group ShinyHunters, which has been targeting Salesforce CRM in recent months.
CONTINUE READING 🡒 Earn Cryptocurrency by Renting Out Your Hard Drive Space
If you have unlimited internet and plenty of free disk space, you might be able to make some money from it. We'll explain how blockchain is used for data storage and conduct an experiment with the Storj…
CONTINUE READING 🡒 Vulnerabilities in Cursor AI Could Be Exploited for Arbitrary Code…
Several vulnerabilities have been fixed in the popular AI code editor Cursor AI. The bugs allowed for the stealthy modification of configuration MCP files and the execution of arbitrary code without the user’s request or approval.
CONTINUE READING 🡒 SonicWall Investigates 0-Day Vulnerability in Its Products Amid Surge in…
SonicWall has warned its customers to disable SSL VPN because in recent weeks, ransomware attackers have been exploiting a potential vulnerability in SonicWall’s 7th generation firewalls.
CONTINUE READING 🡒 Vulnerabilities in Qualcomm Components Used in Targeted Attacks Fixed in…
Google has released August security updates for Android, which include patches for six vulnerabilities. Two of these issues are related to Qualcomm components and have already been used in targeted attacks.
CONTINUE READING 🡒 Geek’s Desktop: No Icons, Drag-and-Drop, or Floating Windows
Have you ever wondered what kind of desktop die-hard Linux enthusiasts use, those who spend most of their time in the terminal? You know, the ones who write a shell script for every little task and look…
CONTINUE READING 🡒 PXA Stealer Stole 200,000 Passwords and 4 Million Cookies
Analysts from Beazley Security and SentinelOne have warned about a campaign distributing an updated version of the PXA Stealer infostealer, written in Python. According to the researchers, the stealer has already compromised over 4,000 victims across 62…
CONTINUE READING 🡒 Cisco User Data Stolen from Cisco[.]com
Representatives from Cisco reported that unknown attackers stole user information from Cisco[.]com as a result of a vishing attack (phone-based phishing) targeted at one of the employees.
CONTINUE READING 🡒 Linux Backdoor ‘Plague’ Evaded Detection for Over a Year
Researchers from Nextron Systems discovered new malware for Linux that remained undetected for over a year. It allows attackers to maintain persistent access via SSH and bypass authentication on compromised systems.
CONTINUE READING 🡒 Exploring firewalld: A Simple and Powerful Firewall for Linux to…
There are numerous articles dedicated to configuring a firewall using iptables in Linux, and given the topic's popularity, many more are likely to be written. While basic configurations are relatively straightforward, things get complicated with complex networks…
CONTINUE READING 🡒 Android Trojan PlayPraetor Infected Over 11,000 Devices
Experts from Cleafy discovered a new Android Trojan called PlayPraetor. According to their data, it has already infected over 11,000 devices, with more than 2,000 new infections recorded each week.
CONTINUE READING 🡒 Anthropic Accuses OpenAI Developers of Using Claude
Representatives of Anthropic stated that they revoked OpenAI’s access to the Claude API because the ChatGPT developers were found to be in violation of the service’s terms of use and allegedly used Claude in the development of…
CONTINUE READING 🡒 Understanding File Inclusion and Path Traversal: Two Fundamental Web Vulnerabilities
File Inclusion and Path Traversal vulnerabilities are among the most critical issues in web security, as they allow attackers to read and execute files. In this article, we will start by examining how these vulnerabilities work and…
CONTINUE READING 🡒