[ad_1] The Canadian Copper Mountain Mining Corporation (CMMC) in British Columbia announced that it was the target of a ransomware attack that affected its operations. CMMC, partly owned by Mitsubishi Materials Corporation, is an 18,000-acre claim that produces an average…


[ad_1] Previously unknown Linux malware exploits 30 vulnerabilities in several outdated WordPress plugins and themes to inject malicious JavaScript. According to a report from an antivirus vendor Dr Webthe malware targets both 32-bit and 64-bit Linux systems, providing its operator…

[ad_1] A group of imposters operating out of a Ukrainian call center have defrauded thousands of victims by posing as computer security employees of their banks. They contacted the victims, claimed their bank accounts had been accessed by attackers, and…

[ad_1] Netgear has fixed a high-severity vulnerability affecting several models of Wi-Fi routers and advised customers to update their devices to the latest available firmware as soon as possible. The flaw affects several Nighthawk Wireless AC, AX Nighthawk Wireless (Wi-Fi…

[ad_1] An anonymous Twitter user yesterday posted a set of 10,000 API keys allegedly obtained from the 3Commas cryptocurrency trading platform. 3Commas bots use these API keys to generate profits for clients by interacting with cryptocurrency exchanges without requiring account…

[ad_1] A bug in the Google Home smart speaker installed a backdoor account that could be used to remotely control it and turn it into a spy device by accessing the microphone feed. A researcher discovered the issue and was…

[ad_1] An anonymous Twitter user yesterday posted a set of 10,000 API keys allegedly obtained from the 3Commas cryptocurrency trading platform. 3Commas bots use these API keys to generate profits for clients by interacting with cryptocurrency exchanges without requiring account…

[ad_1] The Royal Ransomware gang claimed responsibility for a cyber attack on telecommunications company Intrado on Tuesday. Although Intrado has yet to share information regarding this incident, sources told BleepingComputer earlier this month that the attack began on December 1…

[ad_1] Malware operators are increasingly abusing the Google Ads platform to deliver malware to unsuspecting users looking for popular software products. Among the products spoofed in these campaigns are Grammarly, MSI Afterburner, Slack, Dashlane, Malwarebytes, Audacity, μTorrent, OBS, Ring, AnyDesk,…

[ad_1] Thousands of Citrix ADC and Gateway deployments remain vulnerable to two critical-severity security issues that the vendor has addressed in recent months. The first defect is CVE-2022-27510, corrected November 8. This is an authentication bypass that affects both Citrix…
Recent Posts
- Google Pixel flaw allowed recovery of redacted and cropped images
- New ‘HinataBot’ botnet could launch massive 3.3 Tbps DDoS attacks
- Emotet malware is now distributed in Microsoft OneNote files to evade defenses
- Windows 11 to ask permission before pinning apps
- Alleged BreachForums Owner ‘Pompompurin’ Arrested for Cyber Crime
Recent News
-
Hackers steal Steam accounts in new…
September 13, 2022 -
New PsExec spin-off allows hackers to…
September 13, 2022 -
Hackers hack software provider for Magento…
September 13, 2022
Work Together
Let us help you protect your business from all malware, spyware and ransomware attacks.