Home Search
Confluence - search results
If you're not happy with the results, please do another search
Kinsing Malware Uses Unique Techniques to Breach Kubernetes Clusters
By exploiting vulnerabilities in container images and misconfigured PostgreSQL containers, Kinsing malware is now actively infiltrating Kubernetes clusters.
Threat actors are not unusual in using...
Microsoft Defence Report – Hackers Highly Target Publicly-Disclosed Zero-Day Vulnerabilities
Microsoft issues a warning about a rise in the use of publicly revealed zero-day exploits by threat actors in their attacks.
The researchers noted a...
MyDeal Hacked – Over 2.2M Users Data Advertised For Sell on a Hacker Forum
MyDeal, a subsidiary of the Woolworths Group disclosed a data breach that impacted more than 2.2 million customers. Reports say the hacker was attempting...
CSA Provides Common Vulnerability Exploited by China State-Sponsored Hackers – A Complete List
The CISA has recently published a joint CSA with the NSA and the FBI about the top CVEs that are exploited by the threat...
Critical Atlassian Bitbucket Server and Data Center Flaw Let Attackers Execute Malicious Code
Atlassian revealed a critical security flaw in Bitbucket Server and Data Center that allows attackers to execute malicious code on vulnerable instances. The critical...
Sophos Zero-day Flaw Exploited by Chinese Hackers to Implement Backdoor
The Chinese hackers exploited Sophos firewall's zero-day flaw to target South Asian companies and breached cloud-hosted web servers.
Previously, Volexity noticed a sophisticated attack against...
Critical Flaws In The Atlassian Project Let Attackers Take Over Control Of Accounts And...
Check Point Research (CPR) revealed critical vulnerabilities in the Atlassian project that allow attackers to take over control of accounts and Atlassian apps through...
Lebanese Cedar APT group Attack ISP Companies Worldwide
Recently, the Clearsky researchers have joined the Lebanese Cedar group in a cyber espionage campaign that has targeted several companies worldwide. According to the...
Ways Defense Contractors Can Improve Cybersecurity and Compliance
The discovery of information leaks of sensitive data has prompted lawmakers to amend policies and oversight protocols that are kept in place to protect...
Hackers Are Exploiting These Web Application Vulnerabilities to Install Persistent Backdoor – NSA
The security agencies of the US and Australia, NSA (National Security Agency), and ASD (Australian Signals Directorate) have issued a joint security announcement that...