
Blog
-
HHS-OIG Audit South Carolina Identifies Failure to Invoice $14.2 Million for Drug Rebates
The HHS Office of Inspector General (HHS-OIG) audited the South Carolina Department of Health and Human Services, South Carolina’s Medicaid…
-
Feds Issue Warning About Russian Hacking Group Targeting Critical Infrastructure
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and their partners have…
-
What is ACK Piggybacking?-Definition, Attack Types & Prevention
Piggybacking is a term relevant to computer networking and cybersecurity. It describes techniques that aim to optimize data transmission and,…
-
SonicWall Warns of Access Control Vulnerability Exploited in the Wild
SonicWall has issued an urgent security advisory regarding a critical vulnerability (CVE-2024-40766) affecting its [firewall](https://cybersecuritynews.com/best-linux-firewalls/) products. The company warns that…
-
Linux Pluggable Authentication Modules Abused to Create Backdoors
The Group-IB Digital Forensics and Incident Response (DFIR) team has uncovered a novel technique that exploits Linux’s Pluggable Authentication Modules…
-
Critical Progress LoadMaster Vulnerability Let Attackers Execute Arbitrary Code
A critical vulnerability has been identified in the LoadMaster product line, including all LoadMaster releases and the LoadMaster Multi-Tenant (MT)…
-
Researcher Details Exploitation of Exchange PowerShell via MultiValuedProperty
OffensiveCon 2024 devised multiple methods to exploit Microsoft Exchange. One method was using the MultiValuedProperty, through which a researcher was…
-
6 Hackers Charged for Hacking Ukrainian Government Networks
A grand jury in Maryland has charged six Russian nationals with conspiracy to engage in computer intrusion and wire fraud.The…
-
PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access
Google Released a Proof-of-Concept (PoC) for a critical security vulnerability, identified as CVE-2024-26581, which has been discovered in the Linux…
-
Electric vehicle (EV) Owners beware of Quishing Attacks via EV Chargers
Electric vehicle (EV) owners, beware: quishing attack targeting charging stations is on the rise. This cyber threat combines QR codes…