Foreign adversary hacked email communications of the Library of Congress says

1 year ago

The Library of Congress discloses the compromise of some of its IT systems, an alleged foreign threat actor hacked their…

T-Mobile is one of the victims of the massive Chinese breach of telecom firms

1 year ago

T-Mobile confirmed being a victim of recent hacking campaigns linked to China-based threat actors targeting telecom companies. T-Mobile confirms it…

Increased GDPR Enforcement Highlights the Need for Data Security

1 year ago

GDPR protects sensitive data like health and financial details, and its enforcement underscores the growing need for stronger data security…

Critical Really Simple Security plugin flaw impacts 4M+ WordPress sites

1 year ago

A Really Simple Security plugin flaw affects 4M+ sites, allowing attackers full admin access. It’s one of the most critical…

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 20

1 year ago

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security…

Security Affairs newsletter Round 498 by Pierluigi Paganini – INTERNATIONAL EDITION

1 year ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

A botnet exploits e GeoVision zero-day to compromise EoL devices

1 year ago

A botnet employed in DDoS or cryptomining attacks is exploiting a zero-day in end-of-life GeoVision devices to grow up. Researchers…

Palo Alto Networks confirmed active exploitation of recently disclosed zero-day

1 year ago

Palo Alto Networks confirmed active exploitation of a zero-day in its PAN-OS firewall and released new indicators of compromise (IoCs).…

NSO Group used WhatsApp exploits even after Meta-owned company sued it

1 year ago

Court filing revealed that NSO Group used WhatsApp exploits after the instant messaging firm sued the surveillance company. NSO Group…

Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies

1 year ago

The Glove Stealer malware exploits a new technique to bypass Chrome’s App-Bound encryption and steal browser cookies. Glove Stealer is…

This website uses cookies.