Security
Headlines
HeadlinesLatestCVEs

Tag

#ddos

Russian ‘Hacktivists’ Are Causing Trouble Far Beyond Ukraine

The pro-Russian group Killnet is targeting countries supporting Ukraine. It has declared "war" against 10 nations.

Wired
#web#ddos#git#intel#botnet#ibm
Cybersecurity Has a Talent Shortage & Non-Technical People Offer a Way Out

It's time to tap the large reservoir of talent with analytical skills to help tackle cybersecurity problems. Train workers in cybersecurity details while using their ability to solve problems.

Russia Hackers Abusing BRc4 Red Team Penetration Tool in Recent Attacks

By Deeba Ahmed Palo Alto Networks’ Unit 42 security researchers have discovered that Russian state-sponsored hackers are abusing the latest Brute… This is a post from HackRead.com Read the original post: Russia Hackers Abusing BRc4 Red Team Penetration Tool in Recent Attacks

Teen Hackers on Discord Selling Malware for Quick Cash

By Deeba Ahmed Cybersecurity researchers urge parents to keep track of their children’s online activities. Avast security researchers have discovered a server on… This is a post from HackRead.com Read the original post: Teen Hackers on Discord Selling Malware for Quick Cash

The Worst Hacks and Breaches of 2022 So Far

From cryptocurrency thefts to intrusions into telecom giants, state-backed attackers have had a field day in the year’s first half.

ICYMI: A Microsoft Warning, Follina, Atlassian, and More

Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on cyber-pro hopelessness.

CVE-2022-25758: Regular Expression Denial of Service (ReDoS) in org.webjars.npm:scss-tokenizer | CVE-2022-25758 | Snyk

All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.

CVE-2014-3648

The simplepush server iterates through the application installations and pushes a notification to the server provided by deviceToken. But this is user controlled. If a bogus applications is registered with bad deviceTokens, one can generate endless exceptions when those endpoints can't be reached or can slow the server down by purposefully wasting it's time with slow endpoints. Similarly, one can provide whatever HTTP end point they want. This turns the server into a DDOS vector or an anonymizer for the posting of malware and so on.