• Google OAuth Vulnerability Exposes Millions via Failed Startup Domains

    Google OAuth Vulnerability Exposes Millions via Failed Startup Domains

    New research has pulled back the curtain on a “deficiency” in Google’s “Sign in with Google” authentication flow that exploits a quirk in domain ownership to gain access to sensitive data. “Google’s OAuth login doesn’t protect against someone purchasing a failed startup’s domain and using it to re-create email accounts for former employees,” Truffle Security…

    Read More

  • Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners

    Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners

    A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it’s currently responding to “multiple incidents” involving the weaponization of CVE-2024-50603 (CVSS score: 10.0), a maximum severity bug that could result in

    Read More

  • ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]

    ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]

    The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, we’ll break down what’s happening, why it matters, and what you can do to stay…

    Read More

  • Ransomware on ESXi: The Mechanization of Virtualized Attacks

    Ransomware on ESXi: The Mechanization of Virtualized Attacks

    In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand skyrocketing to $5 million. With approximately 8,000 ESXi hosts exposed directly to the internet (according to Shodan), the operational and business impact of these attacks is profound. Most of the Ransomware strands that are attacking ESXi servers nowadays, are…

    Read More

  • WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

    WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

    Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting malicious JavaScript code into a database table associated with the content management system (CMS). “This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database entries to steal sensitive payment

    Read More

  • Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems

    Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems

    No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked by taking control of abandoned and expired infrastructure for as little as $20 per domain. Cybersecurity company watchTowr Labs said it pulled off the operation by registering over 40 domain names that the backdoors had been designed to use…

    Read More

  • How Password Managers Protect Your Accounts

    How Password Managers Protect Your Accounts

    Passwords unlock our digital lives. We use them for email, bank accounts, and more.  Remembering all these passwords is hard. Password managers help us keep our accounts safe and make our lives easier. What is a Password Manager? A password manager keeps all your passwords in one place. Think of it as a digital safe…

    Read More

  • CISA Flags Critical Flaws in Mitel and Oracle Systems Amid Active Exploitation

    CISA Flags Critical Flaws in Mitel and Oracle Systems Amid Active Exploitation

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three flaws impacting Mitel MiCollab and Oracle WebLogic Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-41713 (CVSS score: 9.1) – A path traversal vulnerability in Mitel MiCollab that could allow…

    Read More

  • Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers

    Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers

    Cybersecurity researchers have uncovered firmware security vulnerabilities in the Illumina iSeq 100 DNA sequencing instrument that, if successfully exploited, could permit attackers to brick or plant persistent malware on susceptible devices. “The Illumina iSeq 100 used a very outdated implementation of BIOS firmware using CSM [Compatibility Support Mode] mode and without Secure Boot or standard

    Read More

  • Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year

    Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year

    It’s time once again to pay our respects to the once-famous cybersecurity solutions whose usefulness died in the past year. The cybercriminal world collectively mourns the loss of these solutions and the easy access they provide to victim organizations. These solutions, though celebrated in their prime, succumbed to the twin forces of time and advancing…

    Read More