U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog

1 year ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited…

The ASA flaw CVE-2014-2120 is being actively exploited in the wild

1 year ago

Cisco warns customers that a decade-old ASA vulnerability, tracked as CVE-2014-2120, is being actively exploited in the wild. Cisco warns…

DMM Bitcoin halts operations six months after a $300 million cyber heist

1 year ago

The Japanese cryptocurrency platform DMM Bitcoin is closing its operations just six months after a $300 million cyber heist. DMM…

Energy industry contractor ENGlobal Corporation discloses a ransomware attack

1 year ago

ENGlobal Corporation disclosed a ransomware attack, discovered on November 25, disrupting operations, in a filing to the SEC. A ransomware…

Poland probes Pegasus spyware abuse under the PiS government

1 year ago

Poland probes Pegasus spyware abuse under the PiS government; ex-security chief Piotr Pogonowski arrested to testify before parliament. Poland's government…

BootKitty Linux UEFI bootkit spotted exploiting LogoFAIL flaws

1 year ago

The 'Bootkitty' Linux UEFI bootkit exploits the LogoFAIL flaws (CVE-2023-40238) to target systems using vulnerable firmware. Cybersecurity researchers from ESET…

Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship

1 year ago

The Tor Project seeks help deploying 200 WebTunnel bridges by year-end to counter government censorship. Recent reports from Russia show…

Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested

1 year ago

International law enforcement operation Operation HAECHI-V led to more than 5,500 suspects arrested and seized over $400 million. A global…

How threat actors can use generative artificial intelligence?

1 year ago

Generative Artificial Intelligence (GAI) is rapidly revolutionizing various industries, including cybersecurity, allowing the creation of realistic and personalized content. The…

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 22

1 year ago

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. A…

This website uses cookies.