Critical Unpatched Ray AI Platform Vulnerability Exploited for Cryptocurrency Mining
Mar 27, 2024NewsroomVulnerability / Data Security Cybersecurity researchers are warning that threat actors are actively exploiting a "disputed" and unpatched...
Mar 27, 2024NewsroomVulnerability / Data Security Cybersecurity researchers are warning that threat actors are actively exploiting a "disputed" and unpatched...
A Python coding community is undergoing a software supply-chain attack, with threat actors targeting the 170,000-strong Top.gg GitHub organisation with...
Threat actors actively exploit JetBrains TeamCity flaws to deliver malware Pierluigi Paganini March 20, 2024 Multiple threat actors are exploiting...
Multiple threat actors are exploiting the recently disclosed security flaws in JetBrains TeamCity software to deploy ransomware, cryptocurrency miners, Cobalt...
Mar 19, 2024NewsroomEmail Security / Social Engineering Threat actors are leveraging digital document publishing (DDP) sites hosted on platforms like...
Threat actors leaked 70,000,000+ records allegedly stolen from AT&T Pierluigi Paganini March 17, 2024 Researchers at vx-underground first noticed that...
Endpoints are becoming an increasingly large and lucrative target for threat actors. According to Kaspersky’s data on mobile devices, the...
Mar 13, 2024The Hacker NewsFinancial Fraud / Mobile Security The threat actors behind the PixPirate Android banking trojan are leveraging...
Mar 11, 2024NewsroomRansomware / Vulnerability The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains...
As the threat landscape has evolved with new malicious actors employing increasingly effective tools, techniques and procedures we’ve seen a...
Security Affairs newsletter Round 462 by Pierluigi Paganini – INTERNATIONAL EDITION | Threat actors breached two crucial systems of the...
Threat actors breached two crucial systems of the US CISA Pierluigi Paganini March 09, 2024 Threat actors hacked the systems...
Mar 08, 2024NewsroomEndpoint Security / Network Security Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling...
Mar 07, 2024NewsroomVulnerability / Web Security Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections,...