Abandoned Eval PHP WordPress plugin abused to backdoor websites
Threat actors were observed installing the abandoned Eval PHP plugin on compromised WordPress sites for backdoor deployment. Researchers from Sucuri...
Threat actors were observed installing the abandoned Eval PHP plugin on compromised WordPress sites for backdoor deployment. Researchers from Sucuri...
Z2U that is based in China. Z2U appears to be a broker between individuals buying and selling everything from aged...
Recently I discovered PDF documents that were made public included invoices from both individuals and businesses who used an app...
Lazarus, the prolific North Korean hacking group behind the cascading supply chain attack targeting 3CX, also breached two critical infrastructure organizations...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three security flaws to its Known Exploited Vulnerabilities (KEV)...
A large-scale attack campaign discovered in the wild has been exploiting Kubernetes (K8s) Role-Based Access Control (RBAC) to create backdoors...
Cybersecurity researchers have disclosed details of a now-patched zero-day flaw in Google Cloud Platform (GCP) that could have enabled threat...
Recently, Andrew Martin, founder and CEO of ControlPlane, released a report entitled Cloud Native and Kubernetes Security Predictions 2023. These...
Security researcher Jeremiah Fowler recently discovered a non-password protected database that contained 601.84 GB and 1.16 Billion records. There were...
Credit Card Data Breach Recently I Upon further research there were references to California based Cornerstone Payment Systems. Once we...