Remove 09
Remove 2022 Remove Data Remove Information Security Remove Security
article thumbnail

CISA urges to fix actively exploited Firefox zero-days by March 21

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) added recently disclosed Firefox zero-days to its Known Exploited Vulnerabilities Catalog. The US agency has ordered federal civilian agencies to address both issues by March 21, 2022. Yesterday Mozilla has released Firefox 97.0.2, Firefox ESR 91.6.1, Firefox for Android 97.3.0,

article thumbnail

Hackers stole $80M worth of cryptocurrency from the Qubit DeFi platform

Security Affairs

Researchers from blockchain security firm CertiK speculate that the attackers were able to exploit a security flaw in Qubit’s smart contract code that allowed them to invoke the deposit() function with malicious input data yet actually deposited 0 ETH and withdraw almost $80 million in Binance Coin in return. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Aurora Stealer Malware is becoming a prominent threat in the cybercrime ecosystem

Security Affairs

Aurora Stealer is an info-stealing malware that was first advertised on Russian-speaking underground forums in April 2022. It is a multi-purpose botnet with data stealing and remote access capabilities. “Aurora is another infostealer targeting data from browsers, cryptocurrency wallets, local systems, and acting as a loader.

article thumbnail

Security Affairs newsletter Round 361 by Pierluigi Paganini

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here.

article thumbnail

North Korea-linked Konni APT targets Russian diplomatic bodies

Security Affairs

Security researchers at Cluster25 uncovered a recent campaign carried out by the North Korea-linked Konni APT group aimed at Russian diplomatic entities that used new versions of malware implants. The RAT was able to avoid detection due to continuous evolution, it is able of executing arbitrary code on the target systems and stealing data.

Phishing 143
article thumbnail

The Clock is Ticking for PCI DSS 4.0 Compliance

Thales Cloud Protection & Licensing

Compliance madhav Tue, 09/19/2023 - 05:17 It is essential for any business that stores, processes, and transmits payment card information to comply with the Payment Card Industry Data Security Standard (PCI DSS). Consumers’ payment data is a compelling target for criminals who continue to circumvent IT security defenses.

article thumbnail

Apr 10 – Apr 16 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective. This week the Anonymous collective and its affiliates have targeted multiple Russian organizations stealing gigabytes of data. Apr 03 – Apr 09 Ukraine – Russia the silent cyber conflict. Pierluigi Paganini.