Ransomware operators are exploiting two VMWare ESXi vulnerabilities, CVE-2019-5544 and CVE-2020-3992, to encrypt virtual hard disks. Security experts are warning…
The U.S. CISA reveals that many of the victims of the SolarWinds hackers had no direct connection to SolarWinds. The…
Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and…
Researchers from the security firm NCC Group warn of the exploitation in the wild of a SonicWall zero-day vulnerability. Security…
Google discovered a flaw in GNU Privacy Guard (GnuPG)'s Libgcrypt encryption library that could be exploited to get remote code…
Expert disclosed an unpatched vulnerability in Microsoft Azure Functions that could be exploited to escape the Docker container hosting them.…
A ransomware infected the systems at the UK Research and Innovation (UKRI), at leat two services were impacted. The UK…
Threat actors took over the domain name perl.com and pointed it to an IP address associated with malware campaigns. Attackers…
Multiple issues in WordPress 'Popup Builder' Plugin could be exploited by hackers to perform various malicious actions on affected websites.…
Microsoft, like Google TAG, observed a cyber espionage campaign aimed at vulnerability researchers that attributed to North Korea-linked Zinc APT…
This website uses cookies.