A vendor honeypot caught two attacks intended to leverage the tens of thousands of exposed Selenium Grid Web app testing servers. Go to Source Author: Nate Nelson, Contributing Writer
Category Archives: Uncategorized
With an immature codebase and a “rather chaotic encryption scheme” prone to failure, the group targets small businesses with custom malware. Go to Source Author: Robert Lemos, Contributing Writer
WordPress.org has announced a new account security measure that will require accounts with capabilities to update plugins and themes to activate two-factor authentication (2FA) mandatorily. The enforcement is expected to come into effect starting October 1, 2024. “Accounts with commit access can push updates and changes to plugins and themes used by millions of WordPress […]
The latest step in a journey to serve cybersecurity professionals in other regions of the world. Go to Source Author: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
The operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of SOHO routers and VPN appliances by leveraging a combination of both known and unknown security flaws. Targets include devices from TP-LINK, Zyxel, Asus, Axentra, D-Link, and NETGEAR, according to a new report by French cybersecurity company Sekoia. “The Quad7 botnet […]
A “simplified Chinese-speaking actor” has been linked to a new campaign that has targeted multiple countries in Asia and Europe with the end goal of performing search engine optimization (SEO) rank manipulation. The black hat SEO cluster has been codenamed DragonRank by Cisco Talos, with victimology footprint scattered across Thailand, India, Korea, Belgium, the Netherlands, […]
Business intelligence firm Gartner labels security orchestration, automation, and response as “obsolete,” but the fight to automate and simplify security operations is here to stay. Go to Source Author: Robert Lemos, Contributing Writer
The combination of immutability, indelibility, centralized governance, and user empowerment provides a comprehensive backup strategy, Google said. Go to Source Author: Jennifer Lawinski, Contributing Writer
In the “PixHell” attack, sound waves generated by pixels on a screen can transmit information across seemingly impenetrable air gaps. Go to Source Author: Nate Nelson, Contributing Writer
The Singapore Police Force (SPF) has announced the arrest of five Chinese nationals and one Singaporean man for their alleged involvement in illicit cyber activities in the country. The development comes after a group of about 160 law enforcement officials conducted a series of raids on September 9, 2024, simultaneously at several locations. The six […]
