FBI warns of a zero-day in FatPipe VPNs actively exploited by hackers
The vulnerability allowed the threat actor to gain access to an unrestricted file upload function in the device’s firmware and drop a webshell with root access.
The vulnerability allowed the threat actor to gain access to an unrestricted file upload function in the device’s firmware and drop a webshell with root access.
Although the company did not reveal how many phone numbers were stolen, according to Motherboard, the amount of impacted phone numbers is around 4,400.
The hackers are abusing Fortinet and Microsoft Exchange bugs to compromise networks of a wide range of targets across multiple critical infrastructure sectors in the U.S. and Australia.
The exposed database contained nearly 200 million records in total.
Еhe attackers modified an installed WordPress plugin, which generated a simple HTML page to display a ransom note.
The Pakistani hacker group used Facebook accounts to target former Afghan officials.
Alibaba ECS instances are an increasingly common target for financially motivated cybercriminals, as they have some issues that could be exploited to install malware.
SharkBot is considered to be a “new” generation of mobile malware, as it is able to perform ATS attacks inside the infected device.
Over the weekend, security researchers observed another botnet called Trickbot dropping a loader for the Emotet malware on infected devices.
The malware is written in Golang and currently has low antivirus detection rate.
Showing elements 2761 - 2770