The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware gang is…
The ImControllerService service of Lenovo laptops is affected by a privilege elevation bug that can allow to execute commands with admin…
Experts warn that threat actors are actively attempting to exploit a second bug disclosed in the popular Log4j logging library. American web…
Nation-state actors from China, Iran, North Korea, and Turkey are attempting to exploit the Log4Shell vulnerability to in attacks in the wild.…
Threat actors are using a malicious Internet Information Services (IIS) Server module, dubbed Owowa, to steal Microsoft Exchange credentials. Kaspersky…
The DHS has launched a new bug bounty program dubbed 'Hack DHS' to discover security vulnerabilities in external DHS systems.…
Boffins discovered bugs in WiFi chips that can be exploited to extract passwords and manipulate traffic by targeting a device's…
Threat actors are already abusing Log4Shell vulnerability in the Log4j library for malicious purposes such as deploying malware. A few…
Immediately after the disclosure of the Log4Shell flaw in Log4j library threat actors started including the exploit code in Linux…
Quebec shut down nearly 4,000 of its sites in response to the discovery of the Log4Shell flaw in the Apache Log4j Java-based logging…
This website uses cookies.