Critical Vulnerability Found in Tens of Thousands of SonicWall Firewalls: End-of-Life Devices at Risk

Tens of thousands of firewalls from manufacturer SonicWall that can be accessed from the internet contain critical vulnerabilities or are end-of-life. This is what security company Bishop Fox states based on its own research. The company surveyed the number of SonicWall firewalls and counted 430,000 devices. Of these, more than 20,000 were no longer supported.

Critical Vulnerability Found in Tens of Thousands of SonicWall Firewalls: End-of-Life Devices at Risk Read More »

SQL Injection Cybercriminal Sentenced to 69 Months in Prison for Credit Card Data Theft in the US

A 32-year-old Ukrainian man who stole millions of credit card details using SQL Injection and then sold them on the Internet has been sentenced in the United States to 69 months in prison, the same amount of time he has already served. He must also pay one affected victim $1.8 million in compensation. According to

SQL Injection Cybercriminal Sentenced to 69 Months in Prison for Credit Card Data Theft in the US Read More »

Meta Fined 251 Million Euros for 2018 Data Breach Incident

The Irish privacy regulator DPC imposed a fine of 251 million euros on Meta due to a major data breach with Facebook in 2018. By abusing user tokens, unauthorized third parties managed to obtain data from 29 million users, including three million European users. This included full name, email address, telephone number, location, work location,

Meta Fined 251 Million Euros for 2018 Data Breach Incident Read More »

US Government Mandates Security Measures for Microsoft 365 Environments

Federal US government agencies have been given six months to secure their Microsoft 365 environments according to specific guidelines, the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has announced. CISA has the option to oblige federal government agencies to take certain actions via a “Binding Operational Directive” in order to protect

US Government Mandates Security Measures for Microsoft 365 Environments Read More »

Active Exploitation of Critical Apache Struts 2 Vulnerability Reported by ISC

Attackers are actively exploiting a critical vulnerability in Apache Struts 2, the Internet Storm Center (ISC) reports. The vulnerability (CVE-2024-53677) allows remote code execution. Struts is a very popular open source framework for developing Java web applications and websites. The vulnerability allows a remote attacker to modify file upload parameters, allowing path traversal and in

Active Exploitation of Critical Apache Struts 2 Vulnerability Reported by ISC Read More »

CrowdStrike Seeks Dismissal of Delta Air Lines Lawsuit

CrowdStrike has asked a US judge to drop the lawsuit filed by Delta Air Lines. The cybersecurity company points to the contract conditions. Delta Air Lines has sued CrowdStrike over the major outage caused by an update from the company earlier this year. The American airline claims that the disruption caused damage of more than

CrowdStrike Seeks Dismissal of Delta Air Lines Lawsuit Read More »

Interpol Seeks to Eliminate Term Pig Butchering from Usage

Interpol wants an end to the use of the term ‘Pig Butchering’ because it is said to be offensive to victims. Last month, the Dutch Banking Association (NVB) warned about pig butchering, which is a combination of dating fraud and investment fraud. Scammers first build a relationship of trust with victims and then entice them

Interpol Seeks to Eliminate Term Pig Butchering from Usage Read More »