Skip to content
software vulnerability Page 154

software vulnerability

Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign

Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign

?Feb 01, 2024?NewsroomCryptojacking / Linux Security Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat. “The campaign deploys a benign container generated using the Commando project,”… 

HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

?Feb 01, 2024?NewsroomCryptocurrency / Botnet Cybersecurity researchers have detailed an updated version of the malware HeadCrab that’s known to target Redis database servers across the world since early September 2021. The development, which comes exactly… 

New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

?Feb 01, 2024?NewsroomNetwork Security / Malware Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221 and other threat groups during post-exploitation activity targeting Ivanti Connect Secure VPN… 

CISA Warns of Active Exploitation of Critical Vulnerability in iOS, iPadOS, and macOS

CISA Warns of Active Exploitation of Critical Vulnerability in iOS, iPadOS, and macOS

?Feb 01, 2024?NewsroomVulnerability / Software Update The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw impacting iOS, iPadOS, macOS, tvOS, and watchOS to its Known Exploited Vulnerabilities (KEV) catalog, based… 

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

?Jan 31, 2024?NewsroomCyber Crime / Hacking News Cybersecurity researchers are calling attention to the “democratization” of the phishing ecosystem owing to the emergence of Telegram as an epicenter for cybercrime, enabling threat actors to mount…