According to NBC News, the leaked files included some 120,000 files, with specific allegations of child abuse, names and birthdates of victims, and in some cases, adult descriptions and the alleged abuse information.
At this time is not possible to determine the authenticity of the claims, however, the alleged presence of insiders represents a serious threat to the company that is hard to eradicate.
Three popular WordPress plugins with tens of thousands of active installations are vulnerable to high-severity or critical SQL injection vulnerabilities, with proof-of-concept exploits now publicly available.
A Pro-Russian cybercrime group named NoName057(16) is actively launching distributed denial-of-service (DDoS) attacks against organizations in Ukraine and NATO countries.
In December 2022, the tool’s maintainers announced patches for CVE-2022-46169, a critical-severity command injection flaw that could allow unauthenticated attackers to execute code on the server running Cacti, if a specific data source was used.
Tainted VPN installers are being used to deliver a piece of surveillanceware dubbed EyeSpy as part of a malware campaign. A majority of the infections are said to originate in Iran, with smaller detections in Germany and the U.S.
In a new post by MetaMask, the developers warn of a new scam called ‘Address Poisoning’ that relies on poisoning the wallet’s transaction history with scammer’s addresses that are very similar to addresses that a user recently had transactions.
Positions in outer space cybersecurity, AI mentoring, and digital footprint consulting may sound unusual at first glance, but the rapid development of technology could make them a reality in just a few years.
New York Governor Kathy Hochul is adding an additional $35 million in funding to the state’s $61.9 million cybersecurity budget for this year, while also creating a new team focusing on protecting critical infrastructure.
The malware was discovered by Daniel Milisic, who created a script and instructions to help users nullify the payload and stop its communication with the command and control (C2) server.