October 19, 2021
Home Archive by category exploits
Biz & IT exploits Policy pulse connect secure Tech Technology virtual private networks vpns vulnerabilities

More US agencies potentially hacked, this time with Pulse Secure exploits

EnlargeGetty ImagesAt least five US federal agencies may have experienced cyberattacks that targeted recently discovered security flaws that give hackers free rein over vulnerable networks, the US Cybersecurity and Infrastructure Security Agency said on Friday. The vulnerabilities in Pulse Connect Secure, a VPN that employees use to remotely connec...
Biz & IT exploits File Quarantine GateKeeper MacOS malware notarization shlayer Tech Technology vulnerabilities

Actively exploited Mac 0-day neutered core OS security defenses

EnlargeGetty ImagesWhen Apple released the latest version 11.3 for macOS on Monday, it didn't just introduce support for new features and optimizations. More importantly, the company fixed a zero-day vulnerability that hackers were actively exploiting to install malware without triggering core Mac security mechanisms, some that were in place for mo...
Biz & IT cryptocurrency cryptomining exploits malware Tech Technology vulnerabilities

Windows and Linux devices are under attack by a new cryptomining worm

EnlargeGetty ImagesA newly discovered cryptomining worm is stepping up its targeting of Windows and Linux devices with a batch of new exploits and capabilities, a researcher said. Research company Juniper started monitoring what it’s calling the Sysrv botnet in December. One of the botnet’s malware components was a worm that spread from one vulnera...