SAP Patches Critical Vulnerabilities in NetWeaver

SAP has released 14 security notes on January 2025 Patch Day, including two addressing critical vulnerabilities in NetWeaver.

The post SAP Patches Critical Vulnerabilities in NetWeaver appeared first on SecurityWeek.

SecurityWeek – ​Read More

North Korea stole over $659M in crypto heists during 2024, deploys fake job seekers

A joint international statement provides the first official confirmation that North Korea was behind the $235M hack of WazirX, India’s largest cryptocurrency exchange.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Compromised AWS Keys Abused in Codefinger Ransomware Attacks

A ransomware group tracked as Codefinger is using compromised AWS keys to encrypt S3 bucket data using SSE-C.

The post Compromised AWS Keys Abused in Codefinger Ransomware Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

Hackers Using Fake YouTube Links to Steal Login Credentials

Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks

Attackers have been exploiting a second vulnerability in BeyondTrust’s remote management solutions, CISA warns.

The post CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

New Codefinger Ransomware Abuses Amazon AWS to Encrypt S3 Buckets

The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments

Attackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.

The post Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments appeared first on SecurityWeek.

SecurityWeek – ​Read More

AI, Web3 and Decentralization: Tech Trends Shaping 2025’s Altcoin Season

Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain,…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces

Threat hunters are calling attention to a new campaign that has targeted Fortinet FortiGate firewall devices with management interfaces exposed on the public internet.
“The campaign involved unauthorized administrative logins on management interfaces of firewalls, creation of new accounts, SSL VPN authentication through those accounts, and various other configuration changes,” cybersecurity firm

The Hacker News – ​Read More

Malicious Kong Ingress Controller Image Found on DockerHub

A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More