Old gaps, new access
Despite security updates being installed, cyber criminals have managed to gain permanent access to FortiGate devices. The attackers exploit known vulnerabilities that have long since been closed – but they go one better: they leave behind a so-called backdoor through which they retain access even after the patch.
An old trick with a new twist
Despite its age, the ClickFix method remains a popular tool in the arsenal of cybercriminals. Security researchers from Sophos X-Ops came across the sophisticated attack tactic again in their latest analysis.
WK Kellogg has confirmed a data breach in which sensitive employee data was compromised by exploiting a vulnerability in its Cleo file transfer software.
Car rental company is being blackmailed
The Europcar Mobility Group has been the victim of a targeted cyber attack. Unknown persons gained access to the international car rental company’s GitLab repositories and captured both the source code of the mobile applications and customer data.
Session tokens are also recorded
Security researchers from Sophos X-Ops have investigated the workings of Evilginx. The malware, which is based on the widely used open source web server nginx, poses a significant threat to IT security by enabling targeted adversary-in-the-middle attacks and can even bypass multi-factor authentication (MFA).
The invisible danger
More and more free file converters on the Internet are turning out to be treacherous traps. The FBI warns of manipulated online tools that not only convert files, but also smuggle malware or even ransomware onto victims’ computers. Converters for documents, music files and file mergers are particularly affected.
Hackers threaten to leak data
The Austrian site of Swiss exhibition stand construction specialist Syma is battling a cyber extortion attack. A hacker group has already claimed responsibility for the attack.
Cybersecurity Alert
Cybercriminals are becoming more sophisticated, and one of the most dangerous tactics they use against businesses is spear phishing. Unlike traditional phishing, which involves sending mass emails to random recipients, spear phishing is highly targeted.
On the Trail of a Cybercrime Titan
He is one of the most colorful figures in the hacker scene: IntelBroker repeatedly makes headlines with spectacular attacks on well-known companies. But who is this hacker? What motivates him? And what’s next for us?
Events
Veranstaltungen
Most read articles.
30. March 2025