Zyxel is a trademark name that is used by both Zyxel Communications Corp. and Zyxel Networks, two companies that are involved in the production of networking equipment as well as the provision of services to communications service providers. Zyxel firms have their headquarters in Hsinchu, Taiwan, with branch offices all around the world, including in North A
VMware ESXi is a hypervisor created by VMware that is of the enterprise-class and type-1 varieties. It is used for installing and servicing virtual machines.ESXi is a type-1 hypervisor, which means that it is not a software program that is put on an operating system; rather, it incorporates and integrates essential OS components, such as a kernel, inside its
On Tuesday, Verizon released its 15th annual Data Breach Investigations Report (DBIR), which, as usual, provides security professionals and executives around the world with an overview of global trends and patterns concerning cyberattacks and data breaches.The most recent edition of the report looked at over 23,000 security incidents (of which 5.212 were con
SpiceJet is a low-cost airline that operates out of Gurgaon, which is located in the state of Haryana. As of the month of March 2019, it has a market share of 13.6 percent, making it the nation’s second-biggest airline in terms of the number of passengers transported inside the country.The airline operates a total of 91 planes, of which 13 are Boeing 7
The General Motors Company is a global American automobile manufacturing company with its headquarters in Detroit, Michigan. The corporation is the biggest automotive manufacturer located in the United States and is also one of the major manufacturers of motor vehicles in the world.The owners of Chevrolet, Buick, GMC, and Cadillac automobiles have access to
Threat actors using the Snake keylogger malware for Windows send malicious PDFs via email that have embedded Word documents to compromise their targets’ devices and snatch private data.The PDF malware operation has been observed by researchers at HP’s Wolf Security, who said that malicious PDFs are not a common method to use nowadays as cybercrim
The Chicago Public Schools (CPS), are located in Chicago, Illinois, and are the third biggest school system in the United States. Only the Los Angeles Unified School System, which is the nation’s second-biggest school district, and the New York City Public Schools are larger than the Chicago Public Schools (CPS) (which is the largest school district i
The spoofed BitVex crypto trading platform claims to be managed by Tesla CEO Elon Musk, who founded it to provide 30% returns on bitcoin deposits.What Happened?This phishing attempt started earlier this month with threat actors establishing new YouTube accounts or hacking into ones that already existed in order to broadcast deep fake films purporting to be
The infamous ransomware gang known as the Conti group has effectively brought an end to their operation by taking their infrastructure down and informing their team leaders that the brand no longer exists.What Happened?Yelisey Boguslavskiy of Advanced Intel tweeted this afternoon that the gang’s internal infrastructure had been shut down, which is wher
Nikkei has recently announced that a ransomware attack impacted the Singapore group’s headquarters on May 13.According to the public statement:Unauthorized access to the server was first detected on May 13, prompting an internal probe. Nikkei Group Asia immediately shut down the affected server and took other measures to minimize the impact. (…) The affected
Higher education institutions may be regarded as out-of-scope targets for ransomware operators, however, the trends show that things are quite the opposite. Three distinct colleges have been hit with ransomware. These are North Carolina A&T University, Austin Peay State University, and Lincoln College, with the cyberattack on the latter resulting in the
Privilege escalation is a malicious tactic to misuse an app or OS issue or configuration problem to get unauthorized access to sensitive information by taking over a user’s account that would ordinarily be inaccessible to the current user.By getting these permissions, a hostile actor may undertake a number of operations on the operating system or serve
Security flaws frequently appear during the software development process and then reappear after an application has been deployed. The upsetting part is that in many cases, with the suitable approaches and techniques, many of these vulnerabilities could have been discovered and fixed earlier.Invicti, a web application security company, published a report thi
Various national cybersecurity authorities have recently published a joint advisory that discloses what are the top 10 attack vectors most exploited by cybercriminals.Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of
Tatsu Builder is a popular plugin that integrates very effective template modification tools directly into the user’s web browser.What Happened?Hackers are making extensive use of a remote code execution vulnerability known as CVE-2021-25094 that is present in the Tatsu Builder plugin for WordPress. This plugin is used on about 100,000 different websit
Announce
Share high-quality web security related articles with you:)