HackDig : Dig high-quality web security articles

Zyxel Issues Security Warning

Zyxel is a trademark name that is used by both Zyxel Communications Corp. and Zyxel Networks, two companies that are involved in the production of networking equipment as well as the provision of services to communications service providers. Zyxel firms have their headquarters in Hsinchu, Taiwan, with branch offices all around the world, including in North A
Publish At:2022-05-27 10:50 | Read:344 | Comments:0 | Tags:Cybersecurity News security

A New Ransomware Variant Dubbed ‘Cheers’ Was Discovered

VMware ESXi is a hypervisor created by VMware that is of the enterprise-class and type-1 varieties. It is used for installing and servicing virtual machines.ESXi is a type-1 hypervisor, which means that it is not a software program that is put on an operating system; rather, it incorporates and integrates essential OS components, such as a kernel, inside its
Publish At:2022-05-26 11:01 | Read:136 | Comments:0 | Tags:Cybersecurity News ransomware

The 2022 Verizon Data Breach Investigations Report (DBIR) Is Out

On Tuesday, Verizon released its 15th annual Data Breach Investigations Report (DBIR), which, as usual, provides security professionals and executives around the world with an overview of global trends and patterns concerning cyberattacks and data breaches.The most recent edition of the report looked at over 23,000 security incidents (of which 5.212 were con
Publish At:2022-05-26 11:01 | Read:86 | Comments:0 | Tags:Cybersecurity News

SpiceJet Suffered a Ransomware Attack

SpiceJet is a low-cost airline that operates out of Gurgaon, which is located in the state of Haryana. As of the month of March 2019, it has a market share of 13.6 percent, making it the nation’s second-biggest airline in terms of the number of passengers transported inside the country.The airline operates a total of 91 planes, of which 13 are Boeing 7
Publish At:2022-05-25 06:52 | Read:147 | Comments:0 | Tags:Cybersecurity News ransomware

GM Credential Stuffing Attack Reveals Automobile Owners’ Details

The General Motors Company is a global American automobile manufacturing company with its headquarters in Detroit, Michigan. The corporation is the biggest automotive manufacturer located in the United States and is also one of the major manufacturers of motor vehicles in the world.The owners of Chevrolet, Buick, GMC, and Cadillac automobiles have access to
Publish At:2022-05-24 06:52 | Read:143 | Comments:0 | Tags:Cybersecurity News

This Malware-spreading PDF Uses a Clever File Name to Fool the Unsuspecting Victims

Threat actors using the Snake keylogger malware for Windows send malicious PDFs via email that have embedded Word documents to compromise their targets’ devices and snatch private data.The PDF malware operation has been observed by researchers at HP’s Wolf Security, who said that malicious PDFs are not a common method to use nowadays as cybercrim
Publish At:2022-05-24 06:52 | Read:112 | Comments:0 | Tags:Cybersecurity News

500,000 Chicago Students’ Data Exposed in Ransomware Attack

The Chicago Public Schools (CPS), are located in Chicago, Illinois, and are the third biggest school system in the United States.  Only the Los Angeles Unified School System, which is the nation’s second-biggest school district, and the New York City Public Schools are larger than the Chicago Public Schools (CPS) (which is the largest school district i
Publish At:2022-05-23 10:50 | Read:230 | Comments:0 | Tags:Cybersecurity News ransomware

Deep Fakes of Elon Musk Promote BitVex Fraud

The spoofed  BitVex crypto trading platform claims to be managed by Tesla CEO Elon Musk, who founded it to provide 30% returns on bitcoin deposits.What Happened?This phishing attempt started earlier this month with threat actors establishing new YouTube accounts or hacking into ones that already existed in order to broadcast deep fake films purporting to be
Publish At:2022-05-23 10:50 | Read:176 | Comments:0 | Tags:Cybersecurity News

Conti Ransomware Shuts Down and Rebrands Itself

The infamous ransomware gang known as the Conti group has effectively brought an end to their operation by taking their infrastructure down and informing their team leaders that the brand no longer exists.What Happened?Yelisey Boguslavskiy of Advanced Intel tweeted this afternoon that the gang’s internal infrastructure had been shut down, which is wher
Publish At:2022-05-20 10:50 | Read:232 | Comments:0 | Tags:Cybersecurity News ransomware

Ransomware Hits Media Giant Nikkei’s Asian Unit

Nikkei has recently announced that a ransomware attack impacted the Singapore group’s headquarters on May 13.According to the public statement:Unauthorized access to the server was first detected on May 13, prompting an internal probe. Nikkei Group Asia immediately shut down the affected server and took other measures to minimize the impact. (…) The affected
Publish At:2022-05-20 06:52 | Read:184 | Comments:0 | Tags:Cybersecurity News ransomware

Ransomware Targets Higher Education Institutions

Higher education institutions may be regarded as out-of-scope targets for ransomware operators, however, the trends show that things are quite the opposite. Three distinct colleges have been hit with ransomware. These are North Carolina A&T University, Austin Peay State University, and Lincoln College, with the cyberattack on the latter resulting in the
Publish At:2022-05-19 10:50 | Read:246 | Comments:0 | Tags:Cybersecurity News ransomware

Jupiter Plugin Vulnerabilities Enable Hackers to Hijack Websites

Privilege escalation is a malicious tactic to misuse an app or OS issue or configuration problem to get unauthorized access to sensitive information by taking over a user’s account that would ordinarily be inaccessible to the current user.By getting these permissions, a hostile actor may undertake a number of operations on the operating system or serve
Publish At:2022-05-19 06:52 | Read:223 | Comments:0 | Tags:Cybersecurity News hack

Specialists Spend a Lot of Time Fixing Security Flaws that Could Have Been Prevented

Security flaws frequently appear during the software development process and then reappear after an application has been deployed. The upsetting part is that in many cases, with the suitable approaches and techniques, many of these vulnerabilities could have been discovered and fixed earlier.Invicti, a web application security company, published a report thi
Publish At:2022-05-19 06:52 | Read:174 | Comments:0 | Tags:Cybersecurity News security

Top 10 Attack Vectors Most Exploited by Hackers Revealed

Various national cybersecurity authorities have recently published a joint advisory that discloses what are the top 10 attack vectors most exploited by cybercriminals.Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of
Publish At:2022-05-18 10:50 | Read:134 | Comments:0 | Tags:Cybersecurity News exploit hack

Millions of Cyberattacks Are Targeting Tatsu WordPress Plugin

Tatsu Builder is a popular plugin that integrates very effective template modification tools directly into the user’s web browser.What Happened?Hackers are making extensive use of a remote code execution vulnerability known as CVE-2021-25094 that is present in the Tatsu Builder plugin for WordPress. This plugin is used on about 100,000 different websit
Publish At:2022-05-18 10:50 | Read:184 | Comments:0 | Tags:Cybersecurity News wordpress cyber


Share high-quality web security related articles with you:)
Tell me why you support me <3