Palo Alto Networks PAN-OS sees authentication bypass under attack from hackers

Palo Alto Networks fixes authentication bypass PAN-OS flawA day after the patch was released, criminals started looking for vulnerable endpointsThe flaw allows them to run different PHP scriptsA vulnerability in…

Continue ReadingPalo Alto Networks PAN-OS sees authentication bypass under attack from hackers

Amazon EC2 instances under fire from whoAMI attacks potentially giving hackers code execution access

A flaw named WhoAMI was found in Amazon Machine ImageIt allows threat actors to gain RCE abilities on people's AWS accountsA fix has been released, but many users are still…

Continue ReadingAmazon EC2 instances under fire from whoAMI attacks potentially giving hackers code execution access

Not even emoji are safe from hackers – smiley faces can be hijacked to hide data, study claims

Researcher finds a way to add invisible text to emojisIt probably can't be used for malware...probablyIt could be used for watermarking or bypassing human moderationA security researcher claims to have…

Continue ReadingNot even emoji are safe from hackers – smiley faces can be hijacked to hide data, study claims

Hackers offer 20 million OpenAI credentials for sale, but it says there’s no evidence of a breach

A hacker has allegedly listed 20 million OpenAI logins for sale However the origins of these credentials are disputedOpenAI says its investigation has found no evidence of a compromiseA hacker…

Continue ReadingHackers offer 20 million OpenAI credentials for sale, but it says there’s no evidence of a breach

North Korean hackers are targeting LinkedIn jobseekers with new malware – here’s how to stay safe

North Korean hackers are using LinkedIn to scam jobseekersThe fake job offers often promise well-paid remote workBut the victims are eventually infected with malwareA long-running campaign by notorious North Korean…

Continue ReadingNorth Korean hackers are targeting LinkedIn jobseekers with new malware – here’s how to stay safe

Chinese hackers develop effective new hacking technique to go after business networks

Security researchers observe Chinese attackers targeting network appliancesThe code grants them persistent access and a number of different operationsHackers could grab system details, read sensitive user data, and moreChinese hackers…

Continue ReadingChinese hackers develop effective new hacking technique to go after business networks

North Korean Lazarus hackers launch large-scale cyberattack by cloning open source software

Lazarus was seen poisoning open source software with infostealersThe campaign is dubbed Phantom Circuit, and targets mostly European software devsMultiple repositories were found poisoned with malwareThe notorious North Korean hackers…

Continue ReadingNorth Korean Lazarus hackers launch large-scale cyberattack by cloning open source software

Hackers expose serious Subaru security flaws that allow them to remotely start cars

Two hackers exposed serious security flaws in a 2023 Subaru ImprezaVulnerabilities in a Subaru web portal allowed the pair remote accessSimilar issues could affect a number of major automotive brandsA…

Continue ReadingHackers expose serious Subaru security flaws that allow them to remotely start cars