Russian hacker is set to face trial for the hack of a local power grid

2 years ago

A Russian national (49) was charged with a cyberattack on a local power plant that caused a widespread blackout. The…

230K individuals impacted by a data breach suffered by Telco provider Tangerine

2 years ago

Australian telecommunications provider Tangerine disclosed a data breach that impacted roughly 230,000 individuals. Tangerine suffered a data breach that exposed…

Microsoft released red teaming tool PyRIT for Generative AI

2 years ago

Microsoft has released an open-access automation framework, called PyRIT, to proactively identify risks in generative artificial intelligence (AI) systems. Microsoft has released…

CISA orders federal agencies to fix ConnectWise ScreenConnect bug in a week

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ConnectWise ScreenConnect bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity…

FTC charged Avast with selling users’ browsing data to advertising companies

2 years ago

US FTC charged cyber security firm Avast with harvesting consumer web browsing data through its browser extension and antivirus and…

“Beyond the border scam”, pay attention to the instance of the new Nigerian fraud

2 years ago

Security researcher Salvatore Lombardo shared details about a new instance of Nigerian fraud that he called 'Beyond the border scam.'…

Multiple XSS flaws in Joomla can lead to remote code execution

2 years ago

Joomla maintainers have addressed multiple vulnerabilities in the popular content management system (CMS) that can lead to execute arbitrary code.…

New Mustang Panda campaign targets Asia with a backdoor dubbed DOPLUGS

2 years ago

China-linked APT group Mustang Panda targeted various Asian countries with a variant of the PlugX (aka Korplug) backdoor dubbed DOPLUGS.…

US GOV OFFERS A REWARD OF UP TO $15M FOR INFO ON LOCKBIT GANG MEMBERS AND AFFILIATES

2 years ago

U.S. government offers rewards of up to $15 million for information that could lead to the identification or location of…

New Redis miner Migo uses novel system weakening techniques

2 years ago

A new malware campaign targets Redis servers to deploy the mining crypto miner Migo on compromised Linux hosts. Caro Security…

This website uses cookies.