Security

Oracle confirms the hack of two obsolete servers hacked. No Oracle Cloud systems or customer data were affected

Oracle confirmed a hacker stole credentials from two obsolete servers but said no Oracle Cloud systems or customer data were…

10 months ago

National Social Security Fund of Morocco Suffers Data Breach

Threat actor 'Jabaroot' claims breach of National Social Security Fund of Morocco, aiming to steal large volumes of sensitive citizen…

11 months ago

Critical Fortinet FortiSwitch flaw allows remote attackers to change admin passwords<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

Fortinet addressed a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. Fortinet has…

11 months ago

U.S. CISA adds Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver…

11 months ago

WhatsApp fixed a spoofing flaw that could enable Remote Code Execution

WhatsApp addressed a flaw, tracked as CVE-2025-30401, that could allow attackers to trick users and enable remote code execution. WhatsApp…

11 months ago

Google fixed two actively exploited Android zero-days

Google addressed 62 vulnerabilities with the release of Android 's April 2025 security update, including two actively exploited zero-days. Google…

11 months ago

U.S. CISA adds Ivanti Connect Secure, Policy Secure and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Connect Secure, Policy Secure and ZTA Gateways flaw to its Known…

11 months ago

PoisonSeed Campaign uses stolen email credentials to spread crypto seed scams and and empty wallets

A campaign named PoisonSeed uses stolen CRM and bulk email credentials to send crypto seed scams, aiming to empty victims'…

11 months ago

EDR-as-a-Service makes the headlines in the cybercrime landscape<gwmw style="display:none;"></gwmw>

Cybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests - EDR), targeting major platforms According to a detailed analysis conducted…

11 months ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 40

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape CISA…

11 months ago

This website uses cookies.