Hackers of all kinds are attacking routers across the world

Hackers of all kinds are attacking routers across the world

When hackers find a vulnerable router, they compromise it by installing malware that grants persistence, the ability to run distributed denial of service (DDoS) attacks, hide malicious traffic, and more. But what happens when the hackers find a router that was already compromised by a rival gang? Cybersecurity researchers from Trend Micro published a report … Read more

Hackers attempt to hijack a major WordPress plugin that could allow for site takeovers

Hackers attempt to hijack a major WordPress plugin that could allow for site takeovers

A critical vulnerability recently discovered in a popular WordPress plugin, is being actively abused in the wild, researchers have said, with hackers potentially able to use the flaw to fully take over a victim’s website. WordPress security firm Patchstack first discovered an SQL injection (SQLi) vulnerability in the WP‑Automatic plugin, in mid-March 2024.  WP-Automatic is … Read more

Developing countries are being used by hackers to try out new ransomware strains

Developing countries are being used by hackers to try out new ransomware strains

IT security pros are not the only ones with sandboxes and honeypots to test malware in, as hackers are doing the same – in developing parts of the world. A report from Performanta says that many hackers would first try out new malware strains in developing countries, before targeting companies in the developed world. The … Read more

UnitedHealth confirms major cyberattack, says hackers stole “substantial” amount of patient data

UnitedHealth confirms major cyberattack, says hackers stole “substantial” amount of patient data

UnitedHealth Group has issued an update on the data breach that recently struck its subsidiary, Change Healthcare. The healthcare giant suffered a ransomware attack that knocked some of its services offline and affected different pharmacies and other adjacent businesses across the United States. In an update, UnitedHealth Group said that based on initial targeted data … Read more

Microsoft says Russian hackers are exploiting an ancient printer security flaw

Microsoft says Russian hackers are exploiting an ancient printer security flaw

Russian state-sponsored threat actors were observed abusing an old printer vulnerability to drop custom malware on target endpoints. The malware helped them exfiltrate sensitive data and login credentials. This is according to a new report from Microsoft Threat Intelligence, published earlier this week. As per the report, since mid-2019, a group known as Fancy Bear … Read more

Hackers are loading SVG files with multi-stage malware in new phishing attack

Hackers are loading SVG files with multi-stage malware in new phishing attack

A sophisticated new phishing attack was spotted in the wild, leveraging a wide variety of tools to bypass antivirus protections and ultimately deliver different Remote Access Trojan (RAT) malware. According to cybersecurity researchers at Fortinet, an unidentified threat actor was seen sending phishing emails, stating a shipment has been delivered, and attaching an invoice. This … Read more

Hospital helpdesks targeted by hackers — US Health Department warns health services are under threat

Hospital helpdesks targeted by hackers — US Health Department warns health services are under threat

The US Department of Health and Human Services (HHS) has issued a warning that hackers are attempting to target the helpdesks of hospitals in order to gain access to critical hospital systems. The hackers have been observed contacting hospital IT help desks using local area code phone numbers and then pretending to be a hospital … Read more

Hackers can now hijack your face. Here’s how to fight back

Hackers can now hijack your face. Here’s how to fight back

The future of mobile malware is here. For the first time, cybercriminals are infiltrating iOS and Android devices and stealing user face scans. Then, armed with the power of deepfakes and AI, they’re replicating the user’s likeness to break into their bank accounts. Yes, you read that correctly. Today’s technology allows bad actors to spoof … Read more

Hackers are already attacking this Microsoft SharePoint vulnerability, so patch now

Hackers are already attacking this Microsoft SharePoint vulnerability, so patch now

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a new Microsoft Sharepoint Server vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, signaling that hackers have begun exploiting it in the wild. The vulnerability is tracked as CVE-2023-24955, and carries a severity score of 7.2. It is described as a critical remote code execution … Read more

Ray framework flaw exploited for hackers to breach servers

Ray framework flaw exploited for hackers to breach servers

The Ray framework, an open source tool for AI and Python workload scaling, is vulnerable to half a dozen flaws that allow hackers to hijack the devices and steal sensitive data.  This is according to cybersecurity researchers from Oligo, who published their findings on a new hacking campaign they dubbed “ShadowRay”.  Apparently active since early … Read more