GitHub Says Hackers Breached Dozens of Organizations Using Stolen OAuth Access Tokens

Cloud-based repository hosting service GitHub on Friday revealed that it discovered evidence of an unnamed adversary capitalizing on stolen OAuth user tokens to unauthorizedly download private data from several organizations. “An attacker abused stolen OAuth user tokens issued to two third-party OAuth integrators, Heroku and Travis-CI, to download data from dozens of organizations, including NPM,” […]

Critical VMware Workspace ONE Access Flaw Under Active Exploitation in the Wild

A week after VMware released patches to remediate eight security vulnerabilities in VMware Workspace ONE Access, threat actors have begun to actively exploit one of the critical flaws in the wild. Tracked as CVE-2022-22954, the security shortcoming relates to a remote code execution vulnerability that stems from server-side template injection in VMware Workspace ONE Access […]

Block Admits Data Breach Involving Cash App Data Accessed by Former Employee

Block, the company formerly known as Square, has disclosed a data breach that involved a former employee downloading unspecified reports pertaining to its Cash App Investing that contained information about its U.S. customers. “While this employee had regular access to these reports as part of their past job responsibilities, in this instance these reports were […]

Russia Linked Android Malware Access Camera, Audio & Location

Hacking group Turla is part of the Russian intelligence service that utilizes custom malware to perform cyberespionage mainly to target systems and entities from:- Europe America It may be the Turla hacking group that is responsible for the widespread distribution of infamous malware on Android devices. This malware not only allows hackers to gather information […]

Google Uncovers ‘Initial Access Broker’ Working with Conti Ransomware Gang

Google’s Threat Analysis Group (TAG) took the wraps off a new initial access broker that it said is closely affiliated to a Russian cyber crime gang notorious for its Conti and Diavol ransomware operations. Dubbed Exotic Lily, the financially motivated threat actor has been observed exploiting a now-patched critical flaw in the Microsoft Windows MSHTML […]

Input validation, access control bypass and XSS vulnerabilities in the pfSense firewall: Update immediately

Cybersecurity specialists report the detection of multiple vulnerabilities in pfSense, an open source and custom distribution of FreeBSD optimized for use in devices such as firewalls or routers. According to the report, successful exploitation of these flaws would allow threat actors to deploy some dangerous hacking variants. Below are brief descriptions of the reported flaws, […]

New vulnerability on Mac provides full access to iCloud accounts, PayPal and more of the affected users, as well as granting access to their microphone, camera and screen. The greatest reward ever delivered by Apple

This week, a young cybersecurity researcher demonstrated how to hack the webcams of Mac devices to leave the devices completely open to other attack variants. Ryan Pickren submitted his report to Apple through its rewards program, earning $100,500 USD for his report, the largest reward the company has ever delivered. The young researcher mentions that […]

Initial Access Broker Involved in Log4Shell Attacks Against VMware Horizon Servers

An initial access broker group tracked as Prophet Spider has been linked to a set of malicious activities that exploits the Log4Shell vulnerability in unpatched VMware Horizon Servers. According to new research published by BlackBerry Research & Intelligence and Incident Response (IR) teams today, the cybercrime actor has been opportunistically weaponizing the shortcoming to download […]

Threat actors are actively exploiting a critical vulnerability, CVE-2021-20038, in SonicWall Secure Mobile Access (SMA) gateways. Update immediately

Cybersecurity specialists report that hacking groups are actively exploiting CVE-2021-20038, a severe vulnerability in SonicWall Secure Mobile Access (SMA) gateways, fixed in late 2021. The flaw was described as an unauthenticated stack-based buffer overflow residing in the SMA 100 Series devices (including SMA 200, 210, 400, 410 and 500v). Threat actors can exploit the flaw […]

5 critical vulnerabilities in SonicWall Secure Mobile Access (SMA) Series 100 devices: Update immediately

During a routine security scan, Rapid7 specialists detected five vulnerabilities in SonicWall Secure Mobile Access (SMA) Series 100 devices, including SMA 200, 210, 400, 410 and 500v iterations. According to the report, the exploitation of the most severe of these flaws could lead to a remote code execution condition on the affected devices. The flaws […]

Remote access tools abused to spread malware and steal cryptocurrency

The new campaign also involves replacing cryptocurrency addresses shared via clipboard and setting up fake cryptocurrency websites. Trend Micro researchers have shared details of a new campaign distributing SpyAgent malware by abusing legitimate use RATs (remote access tools), including TeamViewer. Safib assistant also abused in the scam According to a report from Trend Micro, the campaign […]

Leaked FBI document reveals how the agency can access data from WhatsApp, WeChat, iMessage, Telegram, Line, Signal, Wickr and Facebook Messenger

We all know that social media platforms and instant messaging services are really unfriendly to the privacy of their users, although we are not always clear about how this invasion of our confidential information occurs. However, thanks to the work of Mallory Knodel and the Center for Democracy and Technology, it was possible to know […]

Panasonic Disclosed a Security Breach that Hackers Gained Access to Servers

Officials of Panasonic have recently asserted that their servers were accessed illegally earlier this month by hackers. Here’s what the official press release of Panasonic states:- “Panasonic Corporation has confirmed that its network was illegally accessed by a third party on November 11, 2021. As the result of an internal investigation, it was determined that […]

GoDaddy hacked – Hackers access data of 1.2 million customers

GoDaddy detected unauthorized access to its systems where it hosts and manages its customers’ WordPress servers. The Scottsdale, Arizona-based web registrar and hosting firm GoDaddy has disclosed that it suffered a data breach in which the personal details plus login  of up to 1.2 million active and inactive customers were accessed by an “unauthorized third […]

Researchers find 11 malicious Python packages in the PyPI repository that can steal access tokens, passwords and create backdoors

Security specialists from the firm JFrog report the discovery of 11 malicious Python packages in the Python Package Index (PyPI) repository, apparently designed for the theft of access tokens to platforms such as Discord, in addition to intercepting passwords and deploying dependency confusion attacks. The list of malicious packages detected in this research is shown […]

Robinhood Data Breach – Hackers access millions of users’ data

Robinhood data breach involved social engineering attack in which hackers called a customer service staff member and somehow gained access to the support system. A widely used stock trading app, Robinhood, has confirmed suffering a major data breach “late in the evening of November 3.” According to Robinhood, hackers could access data of 7 million users, […]

Hacker accessed FBI server to send fake email threats

The FBI acknowledged the unauthorized access over the weekend revealing that spam emails were sent from the agency’s email server to thousands of organizations. The Federal Bureau of Investigation (FBI) has categorically denied sending spam emails from its server, which according to reports, hit 100,000 inboxes on late Friday night and early Saturday. The agency […]

How to Securely Access Remote Desktop?

Having secure remote access for employees and following best practices is essential to keep your data secure. In the past few months, companies in all industries have worked intensively with the Remote Desktop Protocol (RDP) to maintain their business while maintaining physical distancing.  Since remote desktop access allows a corporate device to be accessed from […]