National intelligence agency of Moldova warns of Russia attacks ahead of the presidential election

2 years ago

The national intelligence agency of Moldova warns of hybrid attacks from Russia ahead of the upcoming elections. The Moldovan national…

CISA adds Apple iOS and iPadOS memory corruption bugs to its Known Exploited Vulnerabilities Catalog

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple iOS and iPadOS memory corruption vulnerabilities to its Known Exploited Vulnerabilities…

Linux Malware targets misconfigured misconfigured Apache Hadoop, Confluence, Docker, and Redis servers

2 years ago

A new Linux malware campaign campaign is targeting misconfigured Apache Hadoop, Confluence, Docker, and Redis instances. Researchers from Cado Security…

CISA ADDS ANDROID PIXEL AND SUNHILLO SURELINE BUGS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Android Pixel and Sunhillo SureLine vulnerabilities to its Known Exploited Vulnerabilities catalog.…

Watch out, GhostSec and Stourmous groups jointly conducting ransomware attacks

2 years ago

Researchers warn that the cybercrime groups GhostSec and Stormous have joined forces in a new ransomware campaign. The GhostSec and…

LockBit 3.0’s Bungled Comeback Highlights the Undying Risk of Torrent-Based (P2P) Data Leakage

2 years ago

The wide torrent-based accessibility of these leaked victim files ensures the longevity of LockBit 3.0’s harmful impact. While embattled ransomware…

Apple emergency security updates fix two new iOS zero-days

2 years ago

Apple released emergency security updates to address two new iOS zero-day vulnerabilities actively exploited in the wild against iPhone users.…

VMware urgent updates addressed Critical ESXi Sandbox Escape bugs

2 years ago

VMware released urgent patches to address critical ESXi sandbox escape vulnerabilities in the ESXi, Workstation, Fusion and Cloud Foundation products…

US Gov sanctioned Intellexa Consortium individuals and entities behind Predator spyware attacks

2 years ago

The U.S. government sanctioned two individuals and five entities linked to the development and distribution of the Predator spyware used…

CISA ADDS MICROSOFT WINDOWS KERNEL BUG USED BY LAZARUS APT TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft Windows Kernel vulnerability to its Known Exploited Vulnerabilities catalog. The…

This website uses cookies.