CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft SharePoint vulnerability disclosed at the 2023 Pwn2Own to its Known…

The DDR Advantage: Real-Time Data Defense

2 years ago

This is the advantage of Data Detection and Response (DDR) for organizations aiming to build a real-time data defense. In…

Finnish police linked APT31 to the 2021 parliament attack

2 years ago

The Finnish Police attributed the attack against the parliament that occurred in March 2021 to the China-linked group APT31. The…

TheMoon bot infected 40,000 devices in January and February

2 years ago

A new variant of TheMoon malware infected thousands of outdated small office and home office (SOHO) routers and IoT devices…

UK, New Zealand against China-linked cyber operations

2 years ago

UK, Australia and New Zealand are accusing China-linked threat actors of cyber operations against UK institutions and parliamentarians. GCHQ’s National…

US Treasury Dep announced sanctions against members of China-linked APT31

2 years ago

The US Treasury Department announced sanctions on two APT31 Chinese hackers linked to attacks against organizations in the US critical…

CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its…

Iran-Linked APT TA450 embeds malicious links in PDF attachments

2 years ago

In recent campaigns, Iran-linked APT group MuddyWater used a legitimate Remote Monitoring and Management (RMM) solution called Atera. Proofpoint researchers…

StrelaStealer targeted over 100 organizations across the EU and US

2 years ago

Researchers reported that over 100 organizations in Europe and US were targeted by a wave of large-scale StrelaStealer campaigns Palo…

GoFetch side-channel attack against Apple systems allows secret keys extraction

2 years ago

Researchers demonstrated a new side-channel attack, named GoFetch, against Apple CPUs that could allow an attacker to obtain secret keys.…

This website uses cookies.