Security
Headlines
HeadlinesLatestCVEs

Source

HackRead

The Best Ways to Automate SBOM Creation

By Owais Sultan SBOM or Software Bill of Materials implies a comprehensive inventory of all the constituent elements or components of the software. This is a post from HackRead.com Read the original post: The Best Ways to Automate SBOM Creation

HackRead
#vulnerability#mac#js#git#java#backdoor#maven
French Hospital Suspends Operations After Crippling Cyber Attack

By Habiba Rashid The Andre-Mignot Hospital in Versailles, near Paris, had to cancel operations and transfer patients after being hit by a cyber attack. This is a post from HackRead.com Read the original post: French Hospital Suspends Operations After Crippling Cyber Attack

Data of Israeli Employees from 29 Logistics Firms Sold Online

By Waqas The 50GB worth of data is currently being sold on two clear web forums with a price tag of 1 BTC per database. This is a post from HackRead.com Read the original post: Data of Israeli Employees from 29 Logistics Firms Sold Online

Behind The Success Of Phenomenon Game Fortnite

By Owais Sultan Did you know Fortnite was the first game to break through on a variety of console platforms, including XBOX/PS/Switch? This is a post from HackRead.com Read the original post: Behind The Success Of Phenomenon Game Fortnite

App Flaw Allowed Honda and Nissan Cars Hack by Knowing VIN number

By Habiba Rashid According to white hat hacker Sam Curry, once exploited, attackers could use the flaw to unlock the door, honk the horn, flash the lights, or even start the vehicle. This is a post from HackRead.com Read the original post: App Flaw Allowed Honda and Nissan Cars Hack by Knowing VIN number

North Korean APT37 Unleashes Dolphin Backdoor on South Korea

By Habiba Rashid The backdoor is equipped with a wide range of spying capabilities, including exfiltrating files, keylogging, and stealing browser data, etc. This is a post from HackRead.com Read the original post: North Korean APT37 Unleashes Dolphin Backdoor on South Korea

CryWiper Masquerading as Ransomware to Target Russian Courts

By Deeba Ahmed CryWiper showcases ransomware-like features, such as file modification, adding a .CRY extension to the files, leaving a ransom note, etc. This is a post from HackRead.com Read the original post: CryWiper Masquerading as Ransomware to Target Russian Courts

6 Quadrillion Token Heist Hits BNB Chain-Based DeFi Protocol Ankr

By Deeba Ahmed According to crypto intelligence firm Arkham, the attacker's wallet address was linked to a developer at Ankr, meaning an inside job can't be ruled out. This is a post from HackRead.com Read the original post: 6 Quadrillion Token Heist Hits BNB Chain-Based DeFi Protocol Ankr

Malware Apps Signed with Compromised Android Platform Certificates

By Deeba Ahmed Hackers are using compromised platform certificates to sign Android malware apps. This is a post from HackRead.com Read the original post: Malware Apps Signed with Compromised Android Platform Certificates

Schoolyard Bully Malware Stealing Facebook Credentials on Android

By Deeba Ahmed The campaign is ongoing, and so far, Schoolyard Bully Malware has victimized over 300,000 Facebook users on Android devices across 71 countries. This is a post from HackRead.com Read the original post: Schoolyard Bully Malware Stealing Facebook Credentials on Android