In a concerning development, cybersecurity experts have detected active exploits (RCE) flaws in Atlassian Confluence. The vulnerability poses a severe threat due to the possibility of remote code execution. Atlassian has...
Author - Emma Davis
Analysts Found Mother of All Breaches — 26B Records Leaked
Recent research of SecurityDiscovery uncovers a data breach of a yet-unseen scale. An unnamed database, that primarily consists of data from other leaks, contains more than 26 billion records. For unprecedented scale and the...
Western Digital Blocks Legacy NAS from Accessing Cloud Services
Western Digital warns owners of older NAS My Cloud series devices that they cannot connect to cloud services after June 15, 2023 unless their device is updated to the latest firmware (5.26.202). me remind you that we also...
Hack Group Clop Began to Extort Money from Companies Hacked through MOVEit Transfer
The Clop ransomware group began to extort money from companies affected by a mass attack on a 0-day vulnerability in MOVEit Transfer. The hackers have already started listing the names of the affected companies on their site for...
Hackers Post Fake PoC Exploits on GitHub to Distribute Malware
The attackers pretend to be security researchers on Twitter and on GitHub, publishing fake PoC exploits for various zero-day vulnerabilities in the public domain. In fact, under the guise of exploits, hackers distribute malware...
Western Digital Scared Users by Advising to Change the HDD after 3 Years of Operation
Western Digital users have found that HDDs that use Western Digital Device Analytics (WDDA) are automatically flagged as “warning” in Synology DiskStation Manager after the number of on hours exceeds three years. me...
China Plans to Limit the Use of Bluetooth and Wi-Fi Domestically
The Chinese government is working on a bill that will regulate the use of wireless technologies, including Bluetooth and Wi-Fi, in the country. bill requires operators of Bluetooth, Wi-Fi, and any other form of ad-hoc, mesh, and...
Honda Leaks Customer, Dealer and Internal Documents Due to API Vulnerability
Honda’s e-commerce platform related to power equipment, outboard motors and garden equipment had an API vulnerability. a result, anyone could use a bug in the API and reset the password for any account. Let me remind you...
Sextortionists Generate Nudity Using AI and Photos of Victims from Social Networks
The FBI warns that sextortionists have stepped up and are creating sexually explicit deepfakes using AI and social media photos of victims. term sextortion, derived from the words sex and extortion, is used to refer to such...
Android Fixes Mali GPU Vulnerability Used by Spyware
Google released a monthly set of patches for Android, fixing a total of 56 vulnerabilities, five of which are considered critical, and one vulnerability known as the Mali GPU has been used by hackers since at least December last...