A ransomware group tracked as Codefinger is using compromised AWS keys to encrypt S3 bucket data using SSE-C.
The post Compromised AWS Keys Abused in Codefinger Ransomware Attacks appeared first on SecurityWeek.
Category Added in a WPeMatico Campaign
A ransomware group tracked as Codefinger is using compromised AWS keys to encrypt S3 bucket data using SSE-C.
The post Compromised AWS Keys Abused in Codefinger Ransomware Attacks appeared first on SecurityWeek.
Attackers have been exploiting a second vulnerability in BeyondTrust’s remote management solutions, CISA warns.
The post CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks appeared first on SecurityWeek.
Many Ivanti VPNs are still exposed to attacks exploiting a recent vulnerability tracked as CVE-2025-0282 and Nominet has been named as a victim.
The post Many Ivanti VPNs Still Unpatched as UK Domain Registry Emerges as Victim of Exploitation appeared first on SecurityWeek.
Attackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.
The post Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments appeared first on SecurityWeek.
Infostealer malware allowed threat actors to compromise Telefonica employees’ credentials and access the company’s internal ticketing system.
The post Infostealer Infections Lead to Telefonica Ticketing System Breach appeared first on SecurityWeek.
Redmond’s AI Red Team says human involvement remains irreplaceable in addressing nuanced risks.
The post AI Won’t Take This Job: Microsoft Says Human Ingenuity Crucial to Red-Teaming appeared first on SecurityWeek.
A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.
The post Infostealer Masquerades as PoC Code Targeting Recent LDAP Vulnerability appeared first on SecurityWeek.
The US Justice Department has announced charges against three Russians for operating the Blender and Sinbad cryptocurrency mixers.
The post US Charges 3 Russians for Operating Cryptocurrency Mixers Used by Cybercriminals appeared first on SecurityWeek.
Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024.
The post Emerging FunkSec Ransomware Developed Using AI appeared first on SecurityWeek.
Juniper Networks has patched multiple high-severity vulnerabilities in Junos OS and its third-party components.
The post Juniper Networks Fixes High-Severity Vulnerabilities in Junos OS appeared first on SecurityWeek.
