Microsoft launched its new Microsoft Defender Bounty Program

2 years ago

Microsoft announced this week it will pay up to $20,000 for security vulnerabilities in its Defender products. Microsoft launched its…

Exposed Kubernetes configuration secrets can fuel supply chain attacks

2 years ago

Researchers warn of publicly exposed Kubernetes configuration secrets that could pose a threat of supply chain attack for organizations. Aqua…

North Korea-linked Konni APT uses Russian-language weaponized documents

2 years ago

North Korea-linked Konni APT group used Russian-language Microsoft Word documents to deliver malware. FortiGuard Labs researchers observed the North Korea-linked…

ClearFake campaign spreads macOS AMOS information stealer

2 years ago

Threat actors spread Atomic Stealer (AMOS) macOS information stealer via a bogus web browser update as part of the ClearFake…

Welltok data breach impacted 8.5 million patients in the U.S.

2 years ago

Healthcare services provider Welltok disclosed a data breach that impacted nearly 8.5 million patients in the U.S. Welltok is a…

North Korea-linked APT Diamond Sleet supply chain attack relies on CyberLink software

2 years ago

North Korea-linked APT group Diamond Sleet is distributing a trojanized version of the CyberLink software in a supply chain attack.…

Automotive parts giant AutoZone disclosed data breach after MOVEit hack

2 years ago

American retailer and distributor of automotive parts and accessories AutoZone discloses a data breach after a MOVEit attack. AutoZone is…

New InfectedSlurs Mirai-based botnet exploits two zero-days

2 years ago

Mirai-based botnet InfectedSlurs has been spotted exploiting two zero-day RCE flaws to compromise routers and video recorder (NVR) devices. Akamai…

SiegedSec hacktivist group hacked Idaho National Laboratory (INL)

2 years ago

The Idaho National Laboratory (INL) disclosed a data breach after the SiegedSec hacktivist group leaked stolen human resources data. SiegedSec…

CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog

2 years ago

US CISA adds Looney Tunables Linux flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Looney…

This website uses cookies.