ClickCease cybersecurity Archives - Page 22 of 23 - TuxCare

Is It Possible to Fix...

The technology world is full of big promises, including in cybersecurity. Just think about it: how many times have you heard the promise of a simple, fast fix that will...

Hackers drops CoinMiner and Quasar...

Hackers are using the Emotet botnet to exploit password-protected archive files to drop CoinMiner and Quasar RAT on vulnerable devices. Based on one of the samples analyzed by security researchers,...

Mirai botnet targets Wynncraft Minecraft...

Security company Cloudflare recently ended a 2.5 Tbps distributed denial-of-service (DDoS) attack launched by a Mirai botnet. The company announced the incident while pointing to an increase in multi-terabit DDoS...

Hackers compromise Binance’s BNB smart...

Hackers compromised Binance’s BNB Smart Chain (BSC) and stole an estimated USD 110 million. Hackers were able to get their hands on as much as $110 million worth of coins...

Attackers impersonate Zoom to steal...

A malicious campaign uncovered by security firm Armorblox shows that attackers manipulate Zoom to compromise Microsoft user data. In one of the incidents analyzed, more than 21,000 users of a...

New auth bypass bug targets...

A Fortinet vulnerability in FortiGate firewalls and FortiProxy web proxies could allow a threat actor to perform unauthorized actions on vulnerable devices. The bug, a critical bug traced as CVE-2022-40684,...

Hackers compromise scam sites to...

According to Trend Micro researchers, a threat actor identified as ‘Water Labbu’ is hacking into cryptocurrency scam sites to inject malicious JavaScript with the aim of stealing money from victims...

Chaos malware targets multiple...

According to researchers from Lumen-based Black Lotus Lab, a new Chaos malware is targeting multiple architectures to spread DDoS, cryptocurrency miners, and install backdoors. The malware is written in Go...

Hackers compromise GitHub accounts with...

GitHub warns that cyber attackers are compromising user accounts through a sophisticated phishing campaign. The malicious messages notify users that their CircleCI session has expired and that it is imperative...

Webworm hackers use Windows-based RATs for...

A threat actor identified as Webworm is using Windows-based remote access trojans for cyber espionage. The Symantec Threat Hunter team identified cases where the attacker targeted an IT service provider...

Quantum, BlackCat ransomware gangs breach...

According to security researchers from AdvIntel, ransomware gangs such as Quantum and BlackCat are now using the Emotet malware in attacks. Emotet started as a banking Trojan in 2014 and...

Rockstar Games confirms GTA 6...

A hacker gained access to Rockstar Games’ internal servers and stole 3 GB worth of early GTA 6 footage, photo and source code for the game. The hacker, who was...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter