Rapidly Information Technology News
The online banking platform Bankingly suffered a data breach affecting seven financial institutions, impacting customers across Central and South America. On May 24, the Cybernews team discovered seven Azure Blob Storage repositories that lacked...
The recent vulnerability in Microsoft Office, identified as CVE-2024-38200 with a CVSS score of 9.1, enables the interception of NTLMv2 hashes, which could potentially be used for attacks on corporate networks. All its technical...
Experts from JPCERT conducted a study that enables the identification of ransomware attacks through the analysis of Windows event logs. Typically, one of the most challenging tasks in detecting such attacks is determining the...
The founder of Telegram, Pavel Durov, elaborated on the messaging app’s policy regarding the disclosure of user data to authorities in a post on his Telegram channel. He emphasized that there have been no...
Akamai specialists have uncovered a new vulnerability in the Common Unix Printing System (CUPS), which can be exploited to carry out DDoS attacks. To initiate an attack, an attacker merely needs to send a...
The Central Bureau of Investigation (CBI) in India has detained 26 suspected organizers of illegal call centers operating in four Indian cities, whose employees defrauded citizens across the globe, including in the United States....
In July, the Bank of England experienced a payment system failure due to the expiration of a certificate within the bank’s infrastructure. As a result, the CHAPS system, which processed £6.9 trillion in payments...
Green Hills Software has announced the delivery of “unhackable” communication technologies and computing systems to Donald Trump’s campaign headquarters, aimed at securing the elections and safeguarding democracy. The company’s equipment operates on the INTEGRITY-178...
The Confucius APT group, linked to India, is notorious for its cyberattacks on the critical infrastructure of China, Pakistan, and other South Asian countries. Since 2013, the group has had numerous overlaps with Patchwork...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding four critical vulnerabilities that are actively being exploited in the wild. The vulnerabilities were discovered in products from D-Link, DrayTek, Motion...
Researchers at Datadog have uncovered a new cryptojacking campaign targeting the Docker Engine API, aiming to link containers to a Docker Swarm controlled by malicious actors. This campaign allows attackers to leverage Docker Swarm’s...
Rackspace suffered a cyberattack due to a zero-day vulnerability in a third-party application. The breach impacted the internal performance monitoring system, leading to a temporary shutdown of the customer monitoring dashboard. Rackspace had been...