Category: News

Netgear SOHO Security Bug Allows RCE, Corporate Attacks

The issue lies in a parental-control function that’s always enabled by default, even if users don’t configure for child security.

How REvil May Have Ripped Off Its Own Affiliates

A newly discovered backdoor and double chats could have enabled REvil ransomware-as-a-service operators to hijack victim cases and snatch affiliates’ cuts of ransom payments.

Unpatched Apple Zero-Day in macOS Finder Allows Code Execution

All a user needs to do is click on an email attachment, and boom — the code is silently executed without the victim knowing. It affects Big Sur and prior…
Read more

VMware Warns of Ransomware-Friendly Bug in vCenter Server

VMware urged immediate patching of the max-severity, arbitrary file upload flaw in Analytics service, which affects all appliances running default 6.5, 6.7 and 7.0 installs.

TikTok, GitHub, Facebook Join Open-Source Bug Bounty

The initiative, run by HackerOne, aims to uncover dangerous code repository bugs that end up going viral across the application supply-chain.

Feds Sanctions SUEX Cryptocurrency Exchange for Laundering Ransomware Payouts

The action is the first of its kind in the U.S., as the government increases efforts to get a handle on cybercrime.

Epik Confirms Hack, Gigabytes of Data on Offer

“Time to find out who in your family secretly ran … [a] QAnon hellhole,” said attackers who affiliated themselves with the hacktivist collective Anonymous, noting that Epik had laughable security.

Hackers Are Going ‘Deep-Sea Phishing,’ So What Can You Do About It?

Nick Kael, CTO at Ericom, discusses how phishing is gaining sophistication and what it means for businesses.

Turla APT Plants Novel Backdoor In Wake of Afghan Unrest

“TinyTurla,” simply coded malware that hides away as a legitimate Windows service, has flown under the radar for two years.

46% of On-Prem Databases Globally Contain Vulnerabilities: Is Yours Safe?

Are organizations neglecting the security of their data? An unprecedented five-year study reveals that internal databases are riddled with vulnerabilities – some even years old.