Tag: Hackers

Here you will find all the articles with the tag: Hackers.

Critical authentication bypass flaw in multiple VMware products

Critical authentication bypass flaw in multiple VMware products

VMWare urges customers to immediately patch a critical authentication bypass flaw affecting multiple products. Two vulnerabilities allows attackers with backdoor access to gain admin privileges on multiple VMware products -- and that's not a good thing.  Bruno Lopez of Innotec Security was t... Read more

date14 hours ago
Backdoor in public code repository presents a new security threat

Backdoor in public code repository presents a new security threat

A new form of attack has been used to target big tech firms using "dependency confusion" A professional tester has created a backdoor that researchers found hiding inside open source code targeting four German companies, according to a report in Ars Technica. The tester was checking clients’ r... Read more

date7 days ago
The European wind energy industry is facing a slew of cyberattacks

The European wind energy industry is facing a slew of cyberattacks

Since the start of the crisis in Ukraine, cyberattacks on three European wind-energy businesses have prompted fears that Russian-friendly hackers are attempting to wreak havoc in a sector that stands to profit from attempts to reduce reliance on Russian oil and gas. The hacked firms haven't offi... Read more

date22 days ago
Ukraine asks for cyber assistance from underground hackers

Ukraine asks for cyber assistance from underground hackers

According to two persons familiar with the initiative, the Ukrainian government is looking for participants from the country's hacker community to assist secure key infrastructure and undertake cyber-surveillance missions against Russian forces. When Russian forces stormed towns across Ukraine o... Read more

date3 months ago
Hackers use Google Doc comment emails to trick security tools

Hackers use Google Doc comment emails to trick security tools

Avanan, a cybersecurity company, has shown a rise in the use of Google Docs’ productivity features to sneak malicious content past spam filters and security tools. Jeremey Fuchs, from Avanan, said the company saw cyberattackers use the comment feature in Google Docs over December to attack Outloo... Read more

date4 months ago
‘Trojan Source’ can inject malware into source code undetected

‘Trojan Source’ can inject malware into source code undetected

A new research paper has been published with details about a new technique that can be exploited to inject malware into source code without being detected. Named ‘Trojan Source' by Cambridge University researchers, the method involves the manipulation of source file encoding so that human viewers... Read more

date7 months ago
Microsoft: Russia behind 58% of all state-sponsored hacks

Microsoft: Russia behind 58% of all state-sponsored hacks

The attacks mostly targeted government agencies and think tanks in the United States, Ukraine and U.K. Russia was behind 58 percent of all state-backed cyber attacks carried out over the past year on Western targets, according to new research conducted by Microsoft. The report also found that Ch... Read more

date7 months ago
1 2 3 11