U.S. CISA adds Progress Kemp LoadMaster, Palo Alto Networks PAN-OS and Expedition bugs to its Known Exploited Vulnerabilities catalog

1 year ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Progress Kemp LoadMaster, Palo Alto Networks PAN-OS and Expedition bugs to its Known…

Great Plains Regional Medical Center ransomware attack impacted 133,000 individuals

1 year ago

A ransomware attack on Great Plains Regional Medical Center compromised personal data of 133,000 individuals, exposing sensitive information. On September…

Recently disclosed VMware vCenter Server bugs are actively exploited in attacks

1 year ago

Threat actors are actively exploiting two VMware vCenter Server vulnerabilities tracked as CVE-2024-38812 and CVE-2024-38813, Broadcom warns. Broadcom warns that…

Foreign adversary hacked email communications of the Library of Congress says

1 year ago

The Library of Congress discloses the compromise of some of its IT systems, an alleged foreign threat actor hacked their…

T-Mobile is one of the victims of the massive Chinese breach of telecom firms

1 year ago

T-Mobile confirmed being a victim of recent hacking campaigns linked to China-based threat actors targeting telecom companies. T-Mobile confirms it…

Increased GDPR Enforcement Highlights the Need for Data Security

1 year ago

GDPR protects sensitive data like health and financial details, and its enforcement underscores the growing need for stronger data security…

Critical Really Simple Security plugin flaw impacts 4M+ WordPress sites

1 year ago

A Really Simple Security plugin flaw affects 4M+ sites, allowing attackers full admin access. It’s one of the most critical…

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 20

1 year ago

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security…

Security Affairs newsletter Round 498 by Pierluigi Paganini – INTERNATIONAL EDITION

1 year ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

A botnet exploits e GeoVision zero-day to compromise EoL devices

1 year ago

A botnet employed in DDoS or cryptomining attacks is exploiting a zero-day in end-of-life GeoVision devices to grow up. Researchers…

This website uses cookies.