RubyGems Fixes Critical Unauthorized Gen Takeover Flaw
This was a simple oversight and there is no evidence it's been exploited. While authentication and most rights were indeed checked, the check that the gem you were accessing was…
This was a simple oversight and there is no evidence it's been exploited. While authentication and most rights were indeed checked, the check that the gem you were accessing was…
A critical vulnerability in F5’s Big-IP appliances is being actively exploited. F5 released fixes for the flaw last week. The flaw affects the Big-IP iControl REST authentication component. It can…
This campaign involves Lazarus Group targeting users with spearphishing emails, then installing a set of malicious apps called “TraderTraitor” that disguise themselves as a legitimate cryptocurrency trading application. The ultimate…
GitHub has updated its alert regarding breaches using stolen OAuth token to include a timeline of the attackers’ activity. The threat actor used the tokens to steal repositories belonging to…
In an April 27 blog post, Cloudflare that its “systems automatically detected and mitigated a 15.3 million request-per-second (rps) DDoS attack — one of the largest HTTPS DDoS attacks on…
A collection of vulnerabilities affecting Linux systems could be exploited by local attackers to gain elevated privileges and deploy malware on unprotected systems. Dubbed Nimbuspwn, the security issue involves vulnerabilities…
The Five Eyes countries – Australia, New Zealand, Canada, the UK, and the US – have published a list of the top 15 most routinely exploited vulnerabilities in 2021. The…
According to analysis of recorded ransomware attacks between January and March 2022 by cybersecurity researchers at Digital Shadows, LockBit 2.0 and Conti were the two most active ransomware gangs during…
MDR solutions provider Critical Start raised over $215 million in strategic growth funding from private equity firm Vista Equity Partners. It does this by helping organizations to identify, assess and…
A threat actor group, dubbed Haskers Gang, released an information-stealing malware—ZingoStealer—for free, enabling fellow cybercriminals to leverage the malware for malicious purposes. More information, please check here https://blog.talosintelligence.com/2022/04/haskers-gang-zingostealer.html