Hundreds of thousands of FortiGate firewalls are vulnerable to a critical security issue identified as CVE-2023-27997, almost a month after Fortinet released an update that addresses the problem. […] Source: BleepingComputer | Read More
A case of mistaken identity and further MOVEit Transfer data breaches continue dominated the ransomware news cycle this week. […] Source: BleepingComputer | Read More
Hackers exploit a zero-day privilege escalation vulnerability in the ‘Ultimate Member’ WordPress plugin to compromise websites by bypassing security measures and registering rogue administrator accounts. […] Source: BleepingComputer | Read More
Attackers behind an ongoing series of proxyjacking attacks are hacking into vulnerable SSH servers exposed online to monetize them through services that pay for sharing unused Internet bandwidth. […] Source: BleepingComputer | Read More
Cybersecurity firm Avast has released a free decryptor for the Akira ransomware that can help victims recover their data without paying the crooks any money. […] Source: BleepingComputer | Read More
Chipmaking giant TSMC (Taiwan Semiconductor Manufacturing Company) denied being hacked after the LockBit ransomware gang demanded $70 million not to release stolen data. […] Source: BleepingComputer | Read More
YouTube is currently running what it describes as a “small experiment globally,” warning users to toggle off their ad blockers and avoid being limited to only three video views. […] Source: BleepingComputer | Read More
YouTube is currently running what it describes as a “small experiment globally,” warning users to toggle off their ad blockers and avoid being limited to only three video views. […] Source: BleepingComputer | Read More
Security analysts have discovered a previously undocumented remote access trojan (RAT) named ‘EarlyRAT,’ used by Andariel, a sub-group of the Lazarus North Korean state-sponsored hacking group. […] Source: BleepingComputer | Read More
MITRE shared today this year’s list of the top 25 most dangerous weaknesses plaguing software during the previous two years. […] Source: BleepingComputer | Read More