ClickCease security vulnerabilites Archives - Page 13 of 15 - TuxCare

The Bugs Behind the Vulnerabilities...

We continue to look at the code issues that cause the vulnerabilities impacting the IT world. In this installment of our five-part blog series exploring these bugs, we go through...

Researchers discover thousands of GitHub...

Researchers from the Leiden Institute of Advanced Computer Science have discovered thousands of repositories on GitHub that offer fake proof-of-concept (PoC) exploits for vulnerabilities and malware. Various malicious programs and...

Cranefly hackers exploit Microsoft IIS...

Microsoft Internet Information Services (IIS), a web server that enables hosting of websites and web applications, is being exploited by the Cranefly hacking group to deploy and control malware on...

Hackers use Clop ransomware to...

A hacker group that is identified simply as DEV-0950 is using CIop ransomware to encrypt the network of organizations that were previously infected with the Raspberry Robin worm. Raspberry Robin...

Experts warn of potential critical...

Major operating system vendors, software publishers, email providers and technology companies that integrate OpenSSL into their products have been asked to prepare for a possible “critical” vulnerability in versions 3.0...

Researchers uncover “high-severity” GitHub...

Researchers from the Checkmarx Supply Chain Security team have discovered a “high-severity” vulnerability in GitHub. Using a technique known as Repo jacking, attackers could take control of a GitHub repository...

Hackers exploit critical flaw in...

Researchers from the cybersecurity company Fortinet have uncovered a malicious campaign in which attackers exploit a critical vulnerability in the VMware Workspace One Access to spread various types of malware,...

Critical flaw found in Aptos...

Researchers from Singapore-based Numen Cyber Labs have discovered and shared details on a vulnerability in the Move virtual machine responsible for powering the Aptos blockchain network. Aptos, one of the...

Venus ransomware target publicly-exposed Remote...

A relatively new ransomware operation, identified as Venus is hacking into publicly exposed Remote Desktop services to encrypt Windows devices. According to researchers, Venus ransomware started operating in mid or...

Hackers drops CoinMiner and Quasar...

Hackers are using the Emotet botnet to exploit password-protected archive files to drop CoinMiner and Quasar RAT on vulnerable devices. Based on one of the samples analyzed by security researchers,...

Hackers exploit new ‘Text4Shell’...

Wordfence, a WordPress security company, has uncovered attempts by hackers to exploit the new Text4Shell vulnerability. Tracked as CVE-2022-42889 the flaw was discovered in Apache Commons Text. The vulnerability was...

Budworm hackers target U.S. organizations...

Notorious cyber espionage group Budworm has launched deliberate attacks against a number of high-profile targets, including a U.S. state legislature, a Middle Eastern country and a multinational electronics manufacturer. The...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter