Category: News

Airline Credential-Theft Takes Off in Widening Campaign

A spyware effort bent on stealing cookies and logins is being driven by unsophisticated attackers cashing in on the initial-access-broker boom.

DDoS Attacks: A Flourishing Business for Cybercrooks – Podcast

Imperva’s Peter Klimek on how DDoS attacks started out as inconveniences but evolved to the point where attackers can disrupt businesses for as little as the price of a cup…
Read more

Financial Cybercrime: Following Cryptocurrency via Public Ledgers

John Hammond, security researcher with Huntress, discusses a wallet-hijacking RAT, and how law enforcement recovered millions in Bitcoin after the Colonial Pipeline attack.

REvil/Sodinokibi Ransomware Universal Decryptor Key Is Out

Bitdefender worked with law enforcement to create a key to unlock victims encrypted in ransomware attacks before REvil’s servers went belly-up on July 13.

HP Omen Hub Exposes Millions of Gamers to Cyberattack

A driver privilege-escalation bug gives attackers kernel-mode access to millions of PCs used for gaming.

Azure Zero-Day Flaws Highlight Lurking Supply-Chain Risk

Dubbed OMIGOD, a series of vulnerabilities in the Open Management Infrastructure used in Azure on Linux demonstrate hidden security threats, researchers said.

No Patch for High-Severity Bug in Legacy IBM System X Servers

Two of IBM’s aging flagship server models, retired in 2020, won’t be patched for a command-injection flaw.

Attackers Impersonate DoT in Two-Day Phishing Scam

Threat actors dangled the lure of receiving funds from the $1 trillion infrastructure bill and created new domains mimicking the real federal site.

Adobe Snuffs Critical Bugs in Acrobat, Experience Manager

Adobe releases security updates for 59 bugs affecting its core products, including Adobe Acrobat Reader, XMP Toolkit SDK and Photoshop.

Microsoft Patches Actively Exploited Windows Zero-Day Bug

On Patch Tuesday, Microsoft fixed 66 CVEs, including an RCE bug in MSHTML under active attack as threat actors passed around guides for the drop-dead simple exploit.