SonicWall is emailing customers urging them to upgrade their firewall’s SonicOS firmware to patch an authentication bypass vulnerability in SSL VPN and SSH management that is “susceptible to actual exploitation.” […] Go to Source Author: Bill Toulas
Author Archives: Onsite Computing, Inc.
Hackers are trying to exploit CVE-2024-52875, a critical CRLF injection vulnerability that leads to 1-click remote code execution (RCE) attacks in GFI KerioControl firewall product. […] Go to Source Author: Bill Toulas
Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns. Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious. […]
“Where Warlocks Stay Up Late” project speaks to hackers who have played pivotal roles in shaping the field of cybersecurity. The video interviews are complemented by an encyclopedia and an anthropological map. Go to Source Author: Andrada Fiscutean
Over 4,000 abandoned but still active web backdoors were hijacked and their communication infrastructure sinkholed after researchers registered expired domains used for commanding them. […] Go to Source Author: Bill Toulas
Medusind, a leading billing provider for healthcare organizations, is notifying hundreds of thousands of individuals of a data breach that exposed their personal and health information more than a year ago, in December 2023. […] Go to Source Author: Sergiu Gatlan
Attackers are abusing a Microsoft 365 feature to send payment requests to users, tricking them into logging in to their accounts so attackers can seize control over them. Go to Source Author: Elizabeth Montalbano, Contributing Writer
American football team Green Bay Packers says cybercriminals stole the credit card data of over 8,500 customers after hacking its official Pro Shop online retail store in a September breach. […] Go to Source Author: Sergiu Gatlan
Initial Access Brokers (IABs) are specialized cybercriminals that break into corporate networks and sell stolen access to other attackers. Learn from Specops Software about how IABs operate and how businesses can protect themselves. […] Go to Source Author: Sponsored by Specops Software
Cybercrime is more sophisticated and persistent than ever, putting small businesses at significant risk of attack. The new year offers a fresh start, and what better way to begin than by prioritizing your business’s cybersecurity? Below are seven actionable resolutions to help you protect your data, your customers, and your reputation in the coming year. […]

