Lapsus$ Data Kidnappers Claim Snatches From Microsoft, Okta Post Views: 251 Reading Time: 2 Minutes Lapsus$ shared screenshots of internal Okta systems and 40Gb of purportedly stolen Microsoft data on Bing, Bing Maps and Cortana. Both Microsoft and...
Browser-in-the-Browser Attack Makes Phishing Nearly Invisible Post Views: 589 Reading Time: 2 Minutes The novel method takes advantage of third-party single sign-on (SSO) options embedded on websites that issue popup windows for authentication, such as “Sign in with...
Workaround offered for unpatched HTML-to-PDF rendering vulnerability Post Views: 206 Reading Time: 2 Minutes A popular software library for rendering PDFs from HTML documents suffers from an unpatched vulnerability that poses a remote code execution (RCE) risk,...
Caketap, a New Unix rootkit for stealing ATM banking data Post Views: 490 Reading Time: 2 Minutes Threat analysts following the activity of LightBasin, a financially motivated group of hackers, report the discovery of a previously unknown Unix rootkit that is used to...
Hundreds of GoDaddy-hosted sites backdoored in a single day Post Views: 445 Reading Time: 2 Minutes Internet security analysts have spotted a spike in backdoor infections on WordPress websites hosted on GoDaddy’s Managed WordPress service, all featuring an...
Most QNAP NAS Devices Affected by ‘Dirty Pipe’ Linux Flaw Post Views: 187 Reading Time: 2 Minutes The “Dirty Pipe” Linux kernel flaw – a high-severity vulnerability in all major distros that grants root access to unprivileged users who have local access – affects most...