Security
Headlines
HeadlinesLatestCVEs

Latest News

Small US Cyber Agencies Are Underfunded & That's a Problem

If the US wants to maintain its lead in cybersecurity, it needs to make the tough funding decisions that are demanded of it.

DARKReading
#vulnerability#git#auth
Hackers Exploit Misconfigured Jupyter Servers for Illegal Sports Streaming

Aqua Nautilus’ research reveals hackers are leveraging vulnerable and misconfigured Jupyter Notebook servers to steal live sports streams.…

'Water Barghest' Sells Hijacked IoT Devices for Proxy Botnet Misuse

An elusive, sophisticated cybercriminal group has used known and zero-day vulnerabilities to compromise more than 20,000 SOHO routers and other IoT devices so far, and then puts them up for sale on a residential proxy marketplace for state-sponsored cyber-espionage actors and others to use.

“Sad announcement” email leads to tech support scam

People are receiving disturbing emails that appear to imply something has happened to their friend or family member.

Update now! Apple confirms vulnerabilities are already being exploited

Apple has released security updates that look especially important for Intel-based Macs because they are already being exploited in the wild.

Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim's funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic. "Criminals can now misuse Google Pay and Apple

How Bitcoin’s digital signature feature facilitates Web3 adoption 

Bitcoin is a pioneer in technological advancement and decentralization. As its creator states in the white paper, peer-to-peer…

GHSA-xfv7-h2qg-rjm7: Moodle Lesson activity password bypass through PHP loose comparison

A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to "magic hash" values.

GHSA-j822-x5gg-5r56: Moodle allows users to retrieve information they did not have permission to access

A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access.