Pwn2Own – Over 1 million dollars in Bounties, Samsung Galaxy S21 hacked twice, Printer plays AC/DC Post Views: 636 Reading Time: 1 Minute Trend Micro’s ZDI has awarded $1,081,250 for 61 zero-days exploited at Pwn2Own Austin 2021, with competitors...
Microsoft Exchange ProxyShell exploits used to deploy Babuk ransomware Post Views: 1,238 Reading Time: 1 Minute A new threat actor is hacking Microsoft Exchange servers and breaching corporate networks using the ProxyShell vulnerability to deploy the Babuk...
Mekotio Banking Trojan Resurges with Tweaked Code, Stealthy Campaign Post Views: 392 Reading Time: 1 Minute A new version of a banking trojan known as Mekotio is being deployed in the wild, with malware analysts reporting that it’s using a new,...
Over 30,000 GitLab servers still unpatched against critical bug Post Views: 683 Reading Time: 1 Minute A critical unauthenticated, remote code execution GitLab flaw fixed on April 14, 2021, remains exploitable, with over 50% of deployments remaining...
‘Trojan Source’ attack method can hide bugs into open-source code Post Views: 640 Reading Time: 2 Minutes Academic researchers have released details about a new attack method they call “Trojan Source” that allows injecting vulnerabilities into the...
Chaos ransomware targets gamers via fake Minecraft alt lists Post Views: 357 Reading Time: 1 Minute The Chaos Ransomware gang encrypts gamers’ Windows devices through fake Minecraft alt lists promoted on gaming forums. Minecraft is a massively...