Colorado Department of Higher Education (CDHE) discloses data breach after ransomware attack

2 years ago

The Colorado Department of Higher Education (CDHE) finally disclosed a data breach impacting students, past students, and teachers after the…

Security Affairs newsletter Round 431 by Pierluigi Paganini – International edition

2 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

BlueCharlie changes attack infrastructure in response to reports on its activity

2 years ago

Russia-linked APT group BlueCharlie was observed changing its infrastructure in response to recent reports on its activity. Researchers from Recorded…

Reptile Rootkit employed in attacks against Linux systems in South Korea

2 years ago

Researchers observed threat actors that are using an open-source rootkit called Reptile in attacks aimed at systems in South Korea. Reptile is…

New PaperCut flaw in print management software exposes servers to RCE attacks

2 years ago

Researchers discovered a vulnerability in PaperCut NG/MF print management software that can lead to remote code execution. Cybersecurity researchers at…

A cyberattack impacted operations of multiple hospitals in several US states

2 years ago

A cyberattack has disrupted the computer systems of multiple hospitals in several states, with a severe impact on their operations.…

Married couple pleaded guilty to laundering billions in cryptocurrency stolen from Bitfinex in 2016

2 years ago

A married couple from New York pleaded guilty this week to laundering billions of dollars stolen from Bitfinex in 2016.…

Malicious packages in the NPM designed for highly-targeted attacks

2 years ago

Researchers discovered a new set of malicious packages on the npm package manager that can exfiltrate sensitive developer data. On…

Attackers use dynamic code loading to bypass Google Play store’s malware detections

2 years ago

Threat actors rely on the 'versioning' technique to evade malware detections of malicious code uploaded to the Google Play Store.…

CISA, FBI, and NSA published the list of 12 most exploited vulnerabilities of 2022

2 years ago

CISA, the FBI, and NSA, along with Five Eyes cybersecurity agencies published a list of the 12 most exploited vulnerabilities…

This website uses cookies.