United Nations Development Programme (UNDP) investigates data breach

2 years ago

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack and the subsequent theft of…

FIN7 targeted a large U.S. carmaker with phishing attacks

2 years ago

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large U.S. carmaker with spear-phishing attacks.…

Law enforcement operation dismantled phishing-as-a-service platform LabHost

2 years ago

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost. An international law enforcement operation,…

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

2 years ago

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since 2022. WithSecure researchers identified a…

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available<gwmw style="display: none; background-color: transparent;"></gwmw>

2 years ago

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly available exploit code exists. Cisco…

Linux variant of Cerber ransomware targets Atlassian servers

2 years ago

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. At…

Ivanti fixed two critical flaws in its Avalanche MDM

2 years ago

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can lead to remote command execution.…

Researchers released exploit code for actively exploited Palo Alto PAN-OS bug

2 years ago

Researchers released an exploit code for the actively exploited vulnerability CVE-2024-3400 in Palo Alto Networks' PAN-OS. Researchers at watchTowr Labs…

Cisco warns of large-scale brute-force attacks against VPN and SSH services

2 years ago

Cisco Talos warns of large-scale brute-force attacks against a variety of targets, including VPN services, web application authentication interfaces and…

PuTTY SSH Client flaw allows of private keys recovery

2 years ago

The PuTTY Secure Shell (SSH) and Telnet client are impacted by a critical vulnerability that could be exploited to recover private…

This website uses cookies.