ClickCease security vulnerabilites Archives - Page 15 of 17 - TuxCare

Venus ransomware target publicly-exposed Remote...

A relatively new ransomware operation, identified as Venus is hacking into publicly exposed Remote Desktop services to encrypt Windows devices. According to researchers, Venus ransomware started operating in mid or...

Hackers drops CoinMiner and Quasar...

Hackers are using the Emotet botnet to exploit password-protected archive files to drop CoinMiner and Quasar RAT on vulnerable devices. Based on one of the samples analyzed by security researchers,...

Hackers exploit new ‘Text4Shell’...

Wordfence, a WordPress security company, has uncovered attempts by hackers to exploit the new Text4Shell vulnerability. Tracked as CVE-2022-42889 the flaw was discovered in Apache Commons Text. The vulnerability was...

Budworm hackers target U.S. organizations...

Notorious cyber espionage group Budworm has launched deliberate attacks against a number of high-profile targets, including a U.S. state legislature, a Middle Eastern country and a multinational electronics manufacturer. The...

Mirai botnet targets Wynncraft Minecraft...

Security company Cloudflare recently ended a 2.5 Tbps distributed denial-of-service (DDoS) attack launched by a Mirai botnet. The company announced the incident while pointing to an increase in multi-terabit DDoS...

Hackers compromise nearly 900 servers...

Hackers are exploiting a vulnerability tracked as CVE-2022-41352 in the Zimbra Collaboration Suite (ZCS). Already, threat actors were able to hack into almost 900 servers. The proof-of-concept (PoC) of the...

New Ducktail malware targets Facebook...

Attackers are using a Windows malware called Ducktail to steal Facebook accounts, browsing data and crypto wallets. Ducktail is associated with Vietnamese hackers and relies mainly on social engineering attacks...

Hackers compromise Binance’s BNB smart...

Hackers compromised Binance’s BNB Smart Chain (BSC) and stole an estimated USD 110 million. Hackers were able to get their hands on as much as $110 million worth of coins...

Attackers impersonate Zoom to steal...

A malicious campaign uncovered by security firm Armorblox shows that attackers manipulate Zoom to compromise Microsoft user data. In one of the incidents analyzed, more than 21,000 users of a...

New auth bypass bug targets...

A Fortinet vulnerability in FortiGate firewalls and FortiProxy web proxies could allow a threat actor to perform unauthorized actions on vulnerable devices. The bug, a critical bug traced as CVE-2022-40684,...

U.S. military contractor’s enterprise network...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the NSA have issued a joint report describing an intrusion into the network of a U.S. military contractor that...

Hackers compromise scam sites to...

According to Trend Micro researchers, a threat actor identified as ‘Water Labbu’ is hacking into cryptocurrency scam sites to inject malicious JavaScript with the aim of stealing money from victims...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter