Adobe Patches Actively Exploited ColdFusion Zero-Day Flaw

Adobe Systems released an emergency update for the ColdFusion application server to fix a critical remote code execution that’s already being exploited by attackers. The vulnerability, tracked as CVE-2019-7816, is located in the upload functiona… Continue reading Adobe Patches Actively Exploited ColdFusion Zero-Day Flaw

Attackers Host Phishing Pages on Azure

Researchers have recently seen phishing attacks against Office 365 users wherein fake log-in pages were hosted on Microsoft Azure to give them more credibility. According to researchers from security firm EdgeWave, the rogue emails claim to be from Mi… Continue reading Attackers Host Phishing Pages on Azure

New Service Scans Chrome Extensions for Vulnerabilities and Privacy Risks

Over the past few years, hackers have increasingly abused Google Chrome extensions to steal people’s data, inject rogue ads into websites or hijack CPU power to mine cryptocurrency. Now, a new online scanning service aims to shed more light on t… Continue reading New Service Scans Chrome Extensions for Vulnerabilities and Privacy Risks

Drupal Patches Highly Critical Remote Code Execution Vulnerability

Websites based on the Drupal content management system might be affected by a highly critical vulnerability that could result in remote code execution. The vulnerability affects websites running Drupal 8 with RESTful Web Services (rest) module enabled… Continue reading Drupal Patches Highly Critical Remote Code Execution Vulnerability

North Korean Lazarus Group Starts Targeting Russian Organizations

In an unusual move, the Lazarus hacking group associated with the North Korean government has recently started targeting organizations from Russia. The group’s primary targets until now have been organizations from countries with which North Kor… Continue reading North Korean Lazarus Group Starts Targeting Russian Organizations

WordPress Sites Hacked Through Vulnerable Payment Forms Plug-in

Hackers are exploiting vulnerabilities in a WordPress plug-in that was patched months ago without being publicly announced. A different vulnerability has been found in the same plug-in during a recent forensic investigation and has now been patched. I… Continue reading WordPress Sites Hacked Through Vulnerable Payment Forms Plug-in

New Shlayer Malware Variant Targeting Macs

Security researchers have found a new variant of a trojan program dubbed Shlayer that infects Mac computers and disables the macOS Gatekeeper security agent. Shlayer was discovered a year ago by researchers from Intego and was typically distributed th… Continue reading New Shlayer Malware Variant Targeting Macs