Security

Cisco confirms that data leaked by the Yanluowang ransomware gang were stolen from its systems

Cisco confirmed the May attack and that the data leaked by the Yanluowang ransomware group was stolen from its systems.…

3 years ago

Some firmware bugs in HP business devices are yet to be fixed

Six high-severity firmware bugs affecting several HP Enterprise devices are yet to be patched, some of them since July 2021.…

3 years ago

US Treasury sanctioned Iran ’s Ministry of Intelligence over Albania cyberattack

The U.S. Treasury Department sanctioned Iran 's Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence over the…

3 years ago

$30 Million worth of cryptocurrency stolen by Lazarus from Axie Infinity was recovered

US authorities recovered more than $30 million worth of cryptocurrency stolen by the North Korea-linked Lazarus APT from Axie Infinity.…

3 years ago

Experts warn of attacks exploiting zero-day in WordPress BackupBuddy plugin

Threat actors are exploiting a zero-day vulnerability in a WordPress plugin called BackupBuddy, Wordfence researchers warned. On September 6, 2022, the…

3 years ago

CISA adds 12 new flaws to its Known Exploited Vulnerabilities Catalog

CISA added 12 more security flaws to its Known Exploited Vulnerabilities Catalog including four D-Link vulnerabilities. The U.S. Cybersecurity and Infrastructure…

3 years ago

Cisco will not fix the authentication bypass flaw in EoL routers

Cisco fixed new security flaws affecting its products, including a recently disclosed high-severity issue in NVIDIA Data Plane Development Kit. The most…

3 years ago

Challenges of User Authentication: What You Need to Know

In the digital age, authentication is paramount to a strong security strategy. Which are the challenges of user authentication? In…

3 years ago

Zyxel addressed a critical RCE flaw in its NAS devices

Networking equipment vendor Zyxel addressed a critical vulnerability impacting its network-attached storage (NAS) devices. Zyxel addressed a critical vulnerability, tracked…

3 years ago

Experts discovered TeslaGun Panel used by TA505 to manage its ServHelper Backdoor

Researchers discovered a previously undocumented software control panel, named TeslaGun, used by a cybercrime gang known as TA505. Researchers from…

3 years ago

This website uses cookies.