Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

PikaBot malware on the rise: What organizations need to know 

Ransomware gangs are using a powerful new trojan named PikaBot.

Malwarebytes
#web#git#intel#backdoor#samba#ssl
Here Come the AI Worms

Security researchers created an AI worm in a test environment that can automatically spread between generative AI agents—potentially stealing data and sending spam emails along the way.

Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities

The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of cyber threat actors exploiting known security flaws in Ivanti Connect Secure and Ivanti Policy Secure gateways, noting that the Integrity Checker Tool (ICT) can be deceived to provide a false sense of security. "Ivanti ICT is not sufficient to detect compromise and that a cyber threat actor may be able

CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info

By Waqas In an exclusive statement to Hackread.com, CutOut.Pro denied the breach and labeled the leak as a 'clear scam.' This is a post from HackRead.com Read the original post: CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info

Android Money Transfer XHelper App Exposed as Money Laundering Network

By Deeba Ahmed Don't confuse the XHelper app with the notorious XHelper malware, which targets Android devices and is notoriously difficult to remove. This is a post from HackRead.com Read the original post: Android Money Transfer XHelper App Exposed as Money Laundering Network

Russia Attacked Ukraine's Power Grid at Least 66 Times to ‘Freeze It Into Submission’

Several of the strikes occurred far from the front lines of the conflict, indicating possible war crimes. Researchers say the attacks likely had devastating impacts on civilians.

Insights helps to provide Threat Intelligence

IBM recently released their 2024 X-Force Threat Intelligence Index.According to IBM, this report offers data on the threat landscape “as a resource to IBM clients, researchers in the security industry, policy makers, the media, and the broader community of security professionals and business leaders. It’s [their] intent to keep all parties informed of the current threat landscape so they can make the best decisions for reducing risk.”Part of the threat landscape includes an analysis from Red Hat Insights on the aggregated threats that the Insights team can see affects Red Hat customers.

Multiple vulnerabilities in Adobe Acrobat Reader could lead to remote code execution

Other potential code execution vulnerabilities are also present in Weston Embedded µC/HTTP-server, a web server component in Weston Embedded's in-house operating system and an open-source library that processes several types of potentially sensitive medical tests.

Stop running security in passive mode

As we begin a new year, we wanted to address one of the biggest issues we consistently see in our investigations: passive security.  Incident response engagements are an important part of our work and the intelligence-gathering process and their associated reports can be a treasure trove of tactics, techniques

FBI Alert: Russian Hackers Target Ubiquiti Routers for Data, Botnet Creation

By Deeba Ahmed Russian hackers, part of Russia’s Main Intelligence Directorate of the General Staff, are using compromised Ubiquiti EdgeRouters to… This is a post from HackRead.com Read the original post: FBI Alert: Russian Hackers Target Ubiquiti Routers for Data, Botnet Creation