Tag: Compromise
-
Preventing Breaches Using Indicators of Compromise
The story of cybersecurity involves bad actors and security professionals constantly trying to thwart each other, often using newer and …
-
Wherever There’s Ransomware, There’s Service Account Compromise. Are You Protected?
Until just a couple of years ago, only a handful of IAM pros knew what service accounts are. In the last years, these silent …
-
Malicious npm Packages Mimicking ‘noblox.js’ Compromise Roblox Developers’ Systems
Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again …
-
Oregon Zoo Warns Over 100,000 Customers of Payment Card Compromise
Oregon Zoo has warned that 117,815 customers may have had their payment card information compromised by cybercriminals. In a notice to …
-
Hackers Exploited by GraphQL Vulnerabilities to Compromise Organizations
GraphQL, a query language for APIs, allows clients to request specific data, making it a popular choice for developers. However, its …
-
STAC6451 Hacker Hijacking Microsoft SQL Servers to Compromise Organizations
A sophisticated threat activity cluster, STAC6451, has been identified targeting Microsoft SQL servers. This cluster, primarily observed by …
-
China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates
The China-linked threat actor known as Evasive Panda compromised an unnamed internet service provider (ISP) to push malicious software …
-
WordPress Plugins at Risk From Polyfill Library Compromise
WordPress plugins are currently facing significant security risks due to a recent discovery detailed in a security advisory published by …
-
Critical OpenSSH Flaw Enables Full System Compromise
Over 14 million OpenSSH instances exposed to the internet are now at risk following the discovery of a critical vulnerability in …
-
New North Korean Actor Distributing Malicious npm Packages To Compromise Organizations
Early in 2024, North Korean threat actors persisted in using the public npm registry to disseminate malicious packages that were similar to …
-
92% of Organizations Hit by Credential Compromise from Social Engineering Attacks
More than nine in 10 (92%) organizations experienced an average of six credential compromises caused by email-based social engineering …
-
Spring Cloud Data Flow Let Attackers Compromise The Server
A critical vulnerability has been discovered in Spring Cloud Data Flow, a microservices-based platform for streaming and batch data …
●●●