An ElasticSearch server instance that was left open on the Internet without a password contained sensitive financial information about loans from Indian and African financial services.
The information security program of the United States’ Department of Health and Human Services (HHS) has been deemed ineffective for a fourth consecutive year in an audit by the Office of Inspector General.
Researchers observed the deployment of Mustang Panda’s PlugX implant, custom stagers, reverse shells, and meterpreter-based shellcode, all used to establish long-term persistence on infected endpoints with the intention of conducting espionage.
As seen by Hackread.com, the total number of leaked emails is 285,635 and available for direct and torrent download through the official website of “Enlace Hacktivista,” a platform that aims to “document hacker history.”
According to researchers, the new attack method can be triggered through firewalls, NATs, load balancers, and Deep Packet Inspection (DPI) boxes by sending a malformed sequence of TCP packets. The first wave of noticeable attack campaigns taking advantage of the method occurred in February.
The unsanctioned use of corporate IT systems, devices, and software – known as shadow IT – has increased significantly during the shift to remote work, leading to concerns about information security.
The framework is distributed via a pay-per-install (PPI) service and contains multiple parts, including a loader, a dropper, a protection driver, and a full-featured RAT that implements its own network communication protocol.
The White House on Wednesday will announce a slate of measures to support quantum technology in the United States while laying out steps to boost cybersecurity to defend against the next generation of supercomputers.
The threat group exfiltrates data prior to deploying ransomware and leaks the stolen information if a ransom is not paid. The group has demanded multi-million dollar ransoms from some victims.
The critical flaw, tracked as CVE-2022-26352, stems from a directory traversal attack when performing file uploads, enabling an adversary to execute arbitrary commands on the underlying system.