Breaking News

Security Affairs newsletter Round 460 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

2 days ago

Apple created post-quantum cryptographic protocol PQ3 for iMessage

Apple announced the implementation of a post-quantum cryptographic protocol called PQ3 will be integrated into iMessage. Apple announced a new post-quantum cryptographic…

3 days ago

Russian hacker is set to face trial for the hack of a local power grid

A Russian national (49) was charged with a cyberattack on a local power plant that caused a widespread blackout. The…

3 days ago

230K individuals impacted by a data breach suffered by Telco provider Tangerine

Australian telecommunications provider Tangerine disclosed a data breach that impacted roughly 230,000 individuals. Tangerine suffered a data breach that exposed…

4 days ago

Microsoft released red teaming tool PyRIT for Generative AI

Microsoft has released an open-access automation framework, called PyRIT, to proactively identify risks in generative artificial intelligence (AI) systems. Microsoft has released…

4 days ago

CISA orders federal agencies to fix ConnectWise ScreenConnect bug in a week

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ConnectWise ScreenConnect bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity…

5 days ago

FTC charged Avast with selling users’ browsing data to advertising companies

US FTC charged cyber security firm Avast with harvesting consumer web browsing data through its browser extension and antivirus and…

5 days ago

“Beyond the border scam”, pay attention to the instance of the new Nigerian fraud

Security researcher Salvatore Lombardo shared details about a new instance of Nigerian fraud that he called 'Beyond the border scam.'…

5 days ago

Multiple XSS flaws in Joomla can lead to remote code execution

Joomla maintainers have addressed multiple vulnerabilities in the popular content management system (CMS) that can lead to execute arbitrary code.…

5 days ago

New Mustang Panda campaign targets Asia with a backdoor dubbed DOPLUGS

China-linked APT group Mustang Panda targeted various Asian countries with a variant of the PlugX (aka Korplug) backdoor dubbed DOPLUGS.…

6 days ago

This website uses cookies.