Friday, January 17, 2025

Yearly Archives: 2022

A word from our sponsor

spot_img

Infosec pros want more industry cooperation and support for open standards

Driven by security operations complexity, 46% of organizations are consolidating or plan on...

Source code for Rust-based info-stealer released on hacker forums

The source code for an information-stealing malware coded in Rust has...

Why Layer 8 Is Great

To help discern legitimate traffic from fraud, it helps to understand...

T-Mobile Pitches $4-Per-Customer Settlement for DataLeak Impacting 80M People

After leaking 80 million US customer data records in a cyberattack...

Windows 11 Account lockout policy is enabled by default to block brute force attacks

Starting with Windows 11 Insider Preview build 22528.1000 the OS supports...

SonicWall patches critical SQLi in Analytics and GMS products

Security company SonicWall released updates to address a critical SQL injection...

A DB containing data of 5.4 million Twitter accounts available for sale

A threat actor has leaked data of 5.4 million Twitter accounts...

Microsoft closes two avenues of attack: Office macros, RDP brute-forcing

Microsoft is trying to shut the door on a couple of...

OctoBot WebInterface – Remote Code Execution (RCE) – 0.4.3

Exploit Title: OctoBot WebInterface 0.4.3 - Remote Code Execution (RCE)Exploit Author:...

Dangerous ‘Lightning Framework’ Linux malware installs rootkits, backdoors

A new and previously undetected malware dubbed 'Lightning Framework' targets Linux...