The U.S. federal court system faced "an incredibly significant and sophisticated cybersecurity breach" dating to early 2020 that has "had lingering impacts" on the Department of Justice and other agencies, House Judiciary Chairman Rep. Jerrold Nadler said Thursday. The committee learned in March 2022 about the "startling breadth and scope of the court's document management system's security failure," Nadler said. READ MORE...
Entrust confirmed it was hit by a cyberattack on June 18, which resulted in an intrusion of internal operations systems, but in a statement related to the attack the company remained tight-lipped. The cybersecurity vendor said it has found no indication to date that its dozens of security products for identity and access management, ID and passport issuance, payments, cloud security and data processing were impacted and remain operational. READ MORE...
The Spanish police arrested two people under the accusation of tampering with the Red de Alerta a la Radiactividad (RAR). The RAR is part of the Spanish national security systems and in use to monitor gamma radiation levels across the country. The network is managed, operated and maintained by the General Directorate of Civil Protection and Emergencies (DGPCE) of the Ministry of internal affairs. READ MORE...
A critical Atlassian Confluence vulnerability that was disclosed last week is now being actively exploited in the wild, researchers are warning. According to researchers at Rapid7, the bug in question (CVE-2022-26138, one of three patched last week) is due to a hardcoded password in the Questions for Confluence app, which would allow cyberattackers to gain complete access to data within the on-premises Confluence Server and Confluence Data Center platforms. READ MORE...
Microleaves, a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, recently fixed a vulnerability in their website that exposed their entire user database. Microleaves claims its proxy software is installed with user consent, but data exposed in the breach shows the service has a lengthy history of being supplied with new proxies by affiliates incentivized to distribute the software any which way they can - such as by secretly bundling it with other titles. READ MORE...
Threat actors are generating revenue by using adware bundles, malware, or even hacking into Microsoft SQL servers, to convert devices into proxies that are rented through online proxy services. To steal a device's bandwidth, the threat actors install software called 'proxyware' that allocates a device's available internet bandwidth as a proxy server that remote users can use for various tasks, like testing, intelligence collection, content distribution, or market research. READ MORE...