Hackers Compromise T-Mobile Employee’ Email Accounts and Steal User’ Data

If you are a T-Mobile customer, this news may concern you.

US-based telecom giant T-Mobile has suffered yet another data breach incident that recently exposed personal and accounts information of both its employees and customers to unknown hackers.

W… Continue reading Hackers Compromise T-Mobile Employee’ Email Accounts and Steal User’ Data

GhostCat: New High-Risk Vulnerability Affects Servers Running Apache Tomcat

If your web server is running on Apache Tomcat, you should immediately install the latest available version of the server application to prevent hackers from taking unauthorized control over it.

Yes, that’s possible because all versions (9.x/8.x/7.x/6… Continue reading GhostCat: New High-Risk Vulnerability Affects Servers Running Apache Tomcat

Critical Bug in WordPress Theme Plugin Opens 200,000 Sites to Hackers

A popular WordPress theme plugin with over 200,000 active installations contains a severe but easy-to-exploit software vulnerability that, if left unpatched, could let unauthenticated remote attackers compromise a wide range of websites and blogs.

The… Continue reading Critical Bug in WordPress Theme Plugin Opens 200,000 Sites to Hackers

OpenSSH now supports FIDO U2F security keys for 2-factor authentication

Here’s excellent news for sysadmins. You can now use a physical security key as hardware-based two-factor authentication to securely log into a remote system via SSH protocol.

OpenSSH, one of the most widely used open-source implementations of the Sec… Continue reading OpenSSH now supports FIDO U2F security keys for 2-factor authentication

Adobe Releases Patches for Dozens of Critical Flaws in 5 Software

Here comes the second ‘Patch Tuesday’ of this year.

Adobe today released the latest security updates for five of its widely used software that patch a total of 42 newly discovered vulnerabilities, 35 of which are critical in severity.

The first four … Continue reading Adobe Releases Patches for Dozens of Critical Flaws in 5 Software

5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras

Several Cisco-manufactured network equipments have been found vulnerable to five new security vulnerabilities that could allow hackers to take complete control over them, and subsequently, over the enterprise networks they power.

Four of the five high… Continue reading 5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras

Zoom Bug Could Have Let Uninvited People Join Private Meetings

If you use Zoom to host your remote online meetings, you need to read this piece carefully.

The massively popular video conferencing software has patched a security loophole that could have allowed anyone to remotely eavesdrop on unprotected active me… Continue reading Zoom Bug Could Have Let Uninvited People Join Private Meetings

Russian Pleads Guilty to Running ‘CardPlanet’ to Sell Stolen Credit Cards

Image credit: Times of Israel.
Aleksei Burkov, a 29-year-old Russian hacker, on Thursday pleaded guilty to multiple criminal charges for running two illegal websites that helped cyber criminals commit more than $20 million in credit card fraud.

The fi… Continue reading Russian Pleads Guilty to Running ‘CardPlanet’ to Sell Stolen Credit Cards

Hackers Stole Customers’ Payment Card Details From Over 700 Wawa Stores

Have you stopped at any Wawa convenience store and used your payment card to buy gas or snacks in the last nine months?

If yes, your credit and debit card details may have been stolen by cybercriminals.

Wawa, the Philadelphia-based gas and convenienc… Continue reading Hackers Stole Customers’ Payment Card Details From Over 700 Wawa Stores