Ivanti fixed a maximum severity vulnerability in its CSA solution

1 year ago

Ivanti addressed a critical authentication bypass vulnerability impacting its Cloud Services Appliance (CSA) solution. Ivanti addressed a critical authentication bypass…

Operation Digital Eye: China-linked relies on Visual Studio Code Remote Tunnels to spy on Europen entities

1 year ago

An alleged China-linked APT group targeted large business-to-business IT service providers in Southern Europe as part of Operation Digital Eye…

Chinese national charged for hacking thousands of Sophos firewalls

1 year ago

The U.S. has charged a Chinese national for hacking thousands of Sophos firewall devices worldwide in 2020. The U.S. has…

Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE – Smishing Triad in Action

1 year ago

Resecurity uncovered a large-scale fraud campaign in the UAE where scammers impersonate law enforcement to target consumers. Resecurity has identified…

U.S. CISA adds Microsoft Windows CLFS driver flaw to its Known Exploited Vulnerabilities catalog

1 year ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows Common Log File System (CLFS) driver flaw to its Known…

Microsoft December 2024 Patch Tuesday addressed actively exploited zero-day

1 year ago

Microsoft December 2024 Patch Tuesday security updates addressed 71 vulnerabilities including an actively exploited zero-day. Microsoft December 2024 Patch Tuesday…

SAP fixed critical SSRF flaw in NetWeaver’s Adobe Document Services

1 year ago

SAP has issued patches for 16 vulnerabilities, including a critical SSRF flaw in NetWeaver's Adobe Document Services. SAP addressed 16…

Romanian energy supplier Electrica Group is facing a ransomware attack

1 year ago

Romanian energy supplier Electrica Group is investigating an ongoing ransomware attack impacting its operations. Romanian energy supplier Electrica Group suffered…

Deloitte denied its systems were hacked by Brain Cipher ransomware group

1 year ago

Deloitte has responded to claims by the Brain Cipher ransomware group, which alleges the theft of over 1 terabyte of…

Mandiant devised a technique to bypass browser isolation using QR codes<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

1 year ago

Mandiant revealed a technique to bypass browser isolation using QR codes, enabling command transmission from C2 servers. Browser isolation is…

This website uses cookies.