Sat.Dec 16, 2023

article thumbnail

Hunters International ransomware gang claims to have hacked the Fred Hutch Cancer Center

Security Affairs

The Hunters International ransomware gang claims to have hacked the Fred Hutchinson Cancer Center (Fred Hutch). Another healthcare organization suffered a ransomware attack, the Hunters International ransomware gang claims to have hacked the Fred Hutchinson Cancer Center (Fred Hutch). The ransomware gang has added the organization to its dark web leak site and is threatening the victim to leak the alleged stolen data.

article thumbnail

MongoDB says customer data was exposed in a cyberattack

Bleeping Computer

MongoDB is warning that its corporate systems were breached and that customer data was exposed in a cyberattack that was detected by the company earlier this week. [.

119
119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MongoDB Suffers Security Breach, Exposing Customer Data

The Hacker News

MongoDB on Saturday disclosed it's actively investigating a security incident that has led to unauthorized access to "certain" corporate systems, resulting in the exposure of customer account metadata and contact information.

article thumbnail

Microsoft unveils new, more secure Windows Protected Print Mode

Bleeping Computer

Microsoft announced a new Windows Protected Print Mode (WPP), introducing significant security enhancements to the Windows print system. [.

122
122
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google Just Denied Cops a Key Surveillance Tool

WIRED Threat Level

Plus: Apple tightens anti-theft protections, Chinese hackers penetrate US critical infrastructure, and the long-running rumor of eavesdropping phones crystallizes into more than an urban legend.

article thumbnail

QNAP VioStor NVR vulnerability actively exploited by malware botnet

Bleeping Computer

A Mirai-based botnet named 'InfectedSlurs' is exploiting a remote code execution (RCE) vulnerability in QNAP VioStor NVR (Network Video Recorder) devices to hijack and make them part of its DDoS (distributed denial of service) swarm. [.

DDOS 92

More Trending

article thumbnail

The Ultimate Guide to Network Segmentation Compliance: Ensuring Cybersecurity Standards

Security Boulevard

Network Security Policy Compliance Having a well-defined network security policy is crucial for organizations to maintain compliance with cybersecurity standards. A network security policy outlines the rules and guidelines within a network. These rules and guidelines ensure the confidentiality, integrity, and availability of data of the network. It serves as a critical framework for managing … The Ultimate Guide to Network Segmentation Compliance: Ensuring Cybersecurity Standards Read More » The

article thumbnail

IDEMIA’s Big Glitch: Critical Vulnerabilities Expose Biometric Terminals

Penetration Testing

IDEMIA, a prominent player in this field, recently issued an advisory that highlights critical vulnerabilities in its Access and Time Biometric Terminals. The advisory, released in November 2023, focuses on multiple vulnerabilities affecting products... The post IDEMIA’s Big Glitch: Critical Vulnerabilities Expose Biometric Terminals appeared first on Penetration Testing.

article thumbnail

The Murky Waters of API Visibility and What That Means for Your Company

Security Boulevard

Caves and Muddy Waters The Tham Luang cave rescue, which took place in 2018, was a high-stakes operation in northern Thailand to save a youth soccer team and their coach who were trapped inside a flooded cave. The monsoon rains … The Murky Waters of API Visibility and What That Means for Your Company Read More » The post The Murky Waters of API Visibility and What That Means for Your Company appeared first on TechSpective.

article thumbnail

CVE-2023-49954: Critical SQL Injection Vulnerability in 3CX CRM Integration

Penetration Testing

In the fast-paced world of Internet communications, staying ahead of security threats is not just a choice but a necessity. Recently, 3CX, a renowned VoIP communications company, has issued a stark warning to its... The post CVE-2023-49954: Critical SQL Injection Vulnerability in 3CX CRM Integration appeared first on Penetration Testing.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

DEF CON 31 – Ting-Yu [NiNi] Chen’s ‘Review On The Less Traveled Road – 9 Yrs of Overlooked MikroTik PreAuth RCE’

Security Boulevard

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada ; via the organizations YouTube channel. Permalink The post DEF CON 31 – Ting-Yu [NiNi] Chen’s ‘Review On The Less Traveled Road – 9 Yrs of Overlooked MikroTik PreAuth RCE’ appeared first on Security Boulevard.

article thumbnail

Cybersecurity Industry Baffled by FBI’s Lack of Action on Ransomware Gang

WIRED Threat Level

Plus: Hackers reveal flaws in crypto wallets holding $1 billion, a massive breach of Danish electric utilities, and more.