Yearly Archives: 2022
Cybersecurity is foundational for economic recovery
Organizations, enterprises, and sectors must increasingly combine proactive and reactive digital resilience strategies — cyber security defences alone are no longer sufficient. Resilience must...
New Hertzbleed Attack Impacts Almost All Modern Intel and AMD Processors
A novel side-channel exploit that allows remote attackers to obtain entire cryptographic keys has been discovered. They do so by detecting changes in CPU...
Crypoto Wallet Apps Cloned to Steal Crypto
SeaFlower is a large-scale effort that uses cloned applications from cryptocurrency wallets including MetaMask, Coinbase, imToken, and TokenPocket, according to researchers.
The Seaflower Mission Was...
Panchan: A New Golang-based Peer-To-Peer Botnet Targeting Linux Servers
Since its inception in March 2022, a new Golang-based peer-to-peer (P2P) botnet has been actively targeting Linux computers in the education sector.
The virus, dubbed...
AvosLocker and Cerber2021 Ransomware Exploit Confluence Bug
AvosLocker and Cerber2021 Ransomware Exploit Confluence Bug
Ransomware organizations are exploiting an RCE vulnerability in Atlassian Confluence Server and Data Center instances that has already...
CrescentImp Malware Targets Ukraine’s Media Organisations
Things are still difficult for Ukraine's war-torn country, and the situation is severe. As their struggle against Russia approaches its 100th day, a new...
Shoprite Group issues warning on ‘suspected data compromise’
The Shoprite Group said on Friday evening that it had discovered a possible data breach involving names and ID numbers that might impact certain...
Three PyPI Packages Found Including Password Stealer by Mistake
Due to the inclusion of a malicious'request' dependency in some versions, the PyPI packages 'keep,' 'pyanxdns,' and 'api-res-py' were revealed to include a backdoor...
How To Rename The Table In The Snowflake Method?
Excerpt: We've all heard of cloud computing, and there are a variety of methods available in cloud computing technology. The method known as a...
Symbiote: A New Malware Targeting Linux Systems
Symbiote is a newly discovered sophisticated virus that infects all active processes on Linux computers. Since last year, the malware has been in active...