article thumbnail

The team behind the Joomla CMS discloses a data breach

Security Affairs

Maintainers at the Joomla open-source content management system (CMS) announced a security breach that took place last week. Data contained in the backup includes : Full name Business address Business email address Business phone number Company URL Nature of business Encrypted password (hashed) IP address Newsletter subscription preferences.

CMS 107
article thumbnail

Joomla CMS Discloses Data Leak

Adam Levin

Leaked information included names, addresses, email addresses, phone numbers, encrypted passwords, and IP addresses. The post Joomla CMS Discloses Data Leak appeared first on Adam Levin.

CMS 58
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GoTrim botnet actively brute forces WordPress and OpenCart sites

Security Affairs

C2 communications are encrypted using the Advanced Encryption Standard in Galois Counter Mode (AES-GCM) with a key derived from a passphrase embedded in the malware binary. To mitigate this risk, website administrators should ensure that user accounts (especially administrator accounts) use strong passwords.

CMS 132
article thumbnail

Gootkit delivery platform Gootloader used to deliver additional payloads

Security Affairs

.” Many of the hacked sites employed in the attacks observed by Sophos were serving the fake message board and were running a well-known CMS. Gootloader infection process is multi-stage, it begins with a.NET loader, which comprises a Delphi-based loader malware, which, in turn, contains the final payload in encrypted form.

article thumbnail

VulnRecap 2/26/24 – VMWare, Apple, ScreenConnect Face Risks

eSecurity Planet

February 21, 2024 5 Vulnerabilities Impact Joomla CMS Type of vulnerability: Mail address escaping, XSS, and remote code execution. Bitdefender’s investigation shows that data can be exfiltrated using encrypted image files, highlighting the severity of potential misuse and the need for mitigation. and iPadOS 17.3.

Risk 106