SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 20

1 year ago

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security…

Security Affairs newsletter Round 498 by Pierluigi Paganini – INTERNATIONAL EDITION

1 year ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

A botnet exploits e GeoVision zero-day to compromise EoL devices

1 year ago

A botnet employed in DDoS or cryptomining attacks is exploiting a zero-day in end-of-life GeoVision devices to grow up. Researchers…

Palo Alto Networks confirmed active exploitation of recently disclosed zero-day

1 year ago

Palo Alto Networks confirmed active exploitation of a zero-day in its PAN-OS firewall and released new indicators of compromise (IoCs).…

NSO Group used WhatsApp exploits even after Meta-owned company sued it

1 year ago

Court filing revealed that NSO Group used WhatsApp exploits after the instant messaging firm sued the surveillance company. NSO Group…

Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies

1 year ago

The Glove Stealer malware exploits a new technique to bypass Chrome’s App-Bound encryption and steal browser cookies. Glove Stealer is…

Bitfinex hacker Ilya Lichtenstein was sentenced to 5 years in prison

1 year ago

Bitfinex hacker, Ilya Lichtenstein, who stole 1 billion worth of Bitcoins from Bitfinex in 2016, has been sentenced to five…

U.S. CISA adds Palo Alto Networks Expedition bugs to its Known Exploited Vulnerabilities catalog

1 year ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Palo Alto Networks Expedition bugs to its Known Exploited Vulnerabilities catalog. The U.S.…

Hackers target critical flaw CVE-2024-10914 in EOL D-Link NAS Devices

1 year ago

The exploitation of the recently disclosed ‘won’t fix’ issue CVE-2024-10914 in legacy D-Link NAS devices began days after its disclosure.  …

China-linked threat actors compromised multiple telecos and spied on a limited number of U.S. government officials

1 year ago

China-linked threat actors breached U.S. broadband providers and gained access to private communications of a limited number of U.S. government…

This website uses cookies.