Twitter Flaw Exposes Private Circle Tweets to Public

0
According to reports, there has been a security incident with Twitter’s Private Circle tweets feature as they have been exposed publicly.Twitter’s Private Circle was...

MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web

0
May 08, 2023Ravie LakshmananData Breach / Software Security The threat actors behind the ransomware attack on Taiwanese PC maker MSI last month have leaked...

Join Our Webinar: Learn How to Defeat Ransomware with Identity-Focused Protection

0
May 08, 2023The Hacker NewsWebinar / Ransomware Are you concerned about ransomware attacks? You're not alone. In recent years, these attacks have become increasingly...

Cisco Phone Adapters Flaw Let Attackers Execute Arbitrary Code

0
Cisco SPA112 2-Port Phone Adapters have been reported to be vulnerable to arbitrary code execution via a malicious firmware upgrade. Cisco has classified this...

CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine

0
May 08, 2023Ravie LakshmananCyber Attack / Data Safety An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in...

Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry

0
May 06, 2023Ravie LakshmananAdvanced Persistent Threat An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity...

New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks

0
May 06, 2023Ravie Lakshmanan Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a...

Fleckpe Android Malware Sneaks onto Google Play Store with Over 620,000 Downloads

0
May 05, 2023Ravie LakshmananMobile Security / Android A new Android subscription malware named Fleckpe has been unearthed on the Google Play Store, amassing more...

Lack of Visibility: The Challenge of Protecting Websites from Third-Party Scripts

0
May 05, 2023The Hacker NewsWebsite Security / Data Safety Third-party apps such as Google Analytics, Meta Pixel, HotJar, and JQuery have become critical tools...

N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest Cyberattacks

0
May 05, 2023Ravie LakshmananCyber Threat / Malware The North Korean state-sponsored threat actor known as Kimsuky has been discovered using a new reconnaissance tool...