Compromised
- APPLICATIONS
ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices
May 23, 2025Ravie LakshmananThreat Intelligence / Network Security Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised…
Read More » - APPLICATIONS
Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager
May 21, 2025Ravie LakshmananData Breach / Account Security Google has announced a new feature in its Chrome browser that lets…
Read More » - APPLICATIONS
Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised
Apr 28, 2025Ravie LakshmananWeb Application Security / Vulnerability Threat actors have been observed exploiting two newly disclosed critical security flaws…
Read More » - APPLICATIONS
FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites
Apr 02, 2025Ravie LakshmananRansomware / Email Security The financially motivated threat actor known as FIN7 has been linked to a…
Read More » - APPLICATIONS
Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign
Apr 01, 2025Ravie LakshmananCryptojacking / Cloud Security Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain…
Read More » - APPLICATIONS
150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms
Mar 27, 2025Ravie LakshmananMalware / Website Security An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote…
Read More » - APPLICATIONS
Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector
Mar 04, 2025Ravie LakshmananCyber Espionage / Malware Threat hunters are calling attention to a new highly-targeted phishing campaign that singled…
Read More » - REVIEWS
Serbian student’s Android phone compromised by exploit from Cellebrite
Amnesty International on Friday said it determined that a zero-day exploit sold by controversial exploit vendor Cellebrite was used to…
Read More » - APPLICATIONS
New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems
Feb 26, 2025Ravie LakshmananLinux / Endpoint Security Universities and government organizations in North America and Asia have been targeted by…
Read More » - CAMERA
Border Agents Will No Longer Use Bodycams Because They Are Compromised
U.S. Border Patrol agents will no longer use bodycams after a social media post revealed that individual agents could be…
Read More »