Two backdoors detected in Auerswald VoIP ystem

The backdoors were detected during penetration testing by RedTeam Pentesting GmbH. On December 20th,  it was reported that a backdoor was found in the network of a US Federal Agency.…

Understanding Software Supply Chain and How to Secure It

Some organizations and developers use third-party resources rather than writing software from scratch. Engineers may speed up development and save manufacturing costs by adopting pre-built libraries and open source components,…

Avast found backdoor in US Federal Agency Network

Avast Threat Intelligence Team stated that it tried to notify the agency about the intrusion but didn’t receive any favorable response, which is why it decided to disclose its findings.…

4 Ways Cybercriminals Exploit Remote Teams

Working from home (WFH) is not a piece of cake especially when cybercriminals exploited every possible vulnerability to break into your workstation. Cybercriminals are improving and refining their methods for…

Everything You Need to Know About Amazon Fire TV Stick

We have been bombarded left, right, and center for some time now with streaming services, TV subscriptions, and other entertainment technology. It can be hard to keep up with the…

Grim Finance hacked – $30 million worth of tokens stolen

According to Grim Finance, it was an “advanced attack” in which hackers exploited a flaw in the vault contract. Grim Finance, a DeFi protocol, and Smart Yield Optimizer Platform has…

German audio tech giant Sennheiser exposed 55GB of customers’ data

Sennheiser left personal data of over 28,000 customers exposed on an misconfigured Amazon Web Services (AWS) server. According to a report from vpnMentor, the German audio equipment manufacturer, Sennheiser left…

Conti Ransomware Group Exploiting Log4j Vulnerability

According to researchers, numerous Conti ransomware group members are trying to exploit the Log4j flaw as an initial attack vector. Advanced Intelligence (AdvIntel) security firm has discovered that the Conti…

Spider-Man: No Way Home exploited to push phishing and malware scams

Scammers are exploiting the release of Spider-Man: No Way Home movie to steal credit card and banking data along with harvesting login credentials of unsuspected users, Kaspersky has warned. Since…

Gumtree exposed users’ personal and GPS location via source code

All a user required was to open Gumtree’s website and press the F12 button on Chrome or Firefox browsers to view users’ personal data. A UK-based classified site and used…