HackerOne has expanded the Internet Bug Bounty project to bolster overall open source security. Open source projects, ran by individuals …
This cryptocurrency miner is exploiting the new Confluence remote code execution bug
The z0Miner cryptojacker is now weaponizing a new Confluence vulnerability to mine for cryptocurrency on vulnerable machines. Trend Micro researchers …
Siemens Energy launches AI solution to fight industrial cybercrime
Siemens Energy has launched a new solution for monitoring and responding to cyberthreats against the Industrial Internet of Things (IIoT). …
Close to half of on-prem databases contain vulnerabilities, with many critical flaws
A five-year study has concluded with a sobering fact for businesses using on-premise servers: close to half contain vulnerabilities that may …
Cyberattacks against the aviation industry linked to Nigerian threat actor
Researchers have unmasked a lengthy campaign against the aviation sector, beginning with the analysis of a Trojan by Microsoft. On …
Meris botnet assaults KrebsOnSecurity
KrebsOnSecurity is often the target of disgruntled cybercriminals and has now been targeted by a large and powerful botnet. The …
New Go malware Capoae targets WordPress installs, Linux systems
A new strain of malware, written in Go, has been spotted in cyberattacks launched against WordPress and Linux systems. On …
Cybercriminals recreate Cobalt Strike in Linux
A re-implementation of Cobalt Strike has been “written from scratch” to attack Linux systems. Dubbed Vermilion Strike, Intezer said on …
HP patches severe OMEN driver privilege escalation vulnerability
A high-impact vulnerability in OMEN Command Center driver software has been patched by HP. On Tuesday, researchers from SentinelLabs published …
This is how a cybersecurity researcher accidentally broke Apple Shortcuts
A Detectify researcher has explained how an investigation into Apple CloudKit led to the accidental downtime of Shortcuts functionality for …