Skip to content
information security Page 155

information security

Integrating Insights from Recorded Future to Revolutionize Cloud Security

Integrating Insights from Recorded Future to Revolutionize Cloud Security

?Feb 02, 2024?The Hacker NewsThreat Intelligence / Cloud Security Cloudzy, a prominent cloud infrastructure provider, proudly announces a significant enhancement in its cybersecurity landscape. This breakthrough has been achieved through a recent consultation with Recorded… 

INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs

INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs

?Feb 02, 2024?NewsroomCyber Crime / Malware An INTERPOL-led collaborative operation targeting phishing, banking malware, and ransomware attacks has led to the identification of 1,300 suspicious IP addresses and URLs. The law enforcement effort, codenamed Synergia,… 

FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network

FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network

?Feb 01, 2024?NewsroomCyber Attack / Botnet The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an… 

Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign

Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign

?Feb 01, 2024?NewsroomCryptojacking / Linux Security Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat. “The campaign deploys a benign container generated using the Commando project,”… 

HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

?Feb 01, 2024?NewsroomCryptocurrency / Botnet Cybersecurity researchers have detailed an updated version of the malware HeadCrab that’s known to target Redis database servers across the world since early September 2021. The development, which comes exactly… 

New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

?Feb 01, 2024?NewsroomNetwork Security / Malware Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221 and other threat groups during post-exploitation activity targeting Ivanti Connect Secure VPN… 

CISA Warns of Active Exploitation of Critical Vulnerability in iOS, iPadOS, and macOS

CISA Warns of Active Exploitation of Critical Vulnerability in iOS, iPadOS, and macOS

?Feb 01, 2024?NewsroomVulnerability / Software Update The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw impacting iOS, iPadOS, macOS, tvOS, and watchOS to its Known Exploited Vulnerabilities (KEV) catalog, based…