X will collect biometric data from its premium users

2 years ago

The social media site X announced that it will collect premium users' biometric data for security and identification purposes. The…

“Smishing Triad” Targeted USPS and US Citizens for Data Theft

2 years ago

Resecurity has identified a large-scale smishing campaign, tracked as Smishing Triad, targeting the US Citizens. Earlier episodes have revealed victims…

Publicly available Evil_MinIO exploit used in attacks on MinIO Storage Systems

2 years ago

A threat actor was spotted exploiting MinIO storage system vulnerabilities to execute arbitrary code on affected servers. Security Joes researchers…

University of Sydney suffered a security breach caused by a third-party service provider

2 years ago

The University of Sydney (USYD) suffered a security breach caused by a third-party service provider that exposed personal information of…

Cybercrime will cost Germany $224 billion in 2023

2 years ago

Cybercrime will cost Germany 206 billion euros ($224 billion) in 2023, German digital association Bitkom told Reuters. According to the…

PoC exploit code released for CVE-2023-34039 bug in VMware Aria Operations for Networks

2 years ago

Researcher released PoC exploit code for a recent critical flaw (CVE-2023-34039) in VMware Aria Operations for Networks. At the end…

Security Affairs newsletter Round 435 by Pierluigi Paganini – International edition

2 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

LockBit ransomware gang hit the Commission des services electriques de Montréal (CSEM)

2 years ago

The LockBit ransomware gang claims to have breached the Commission des services electriques de Montréal (CSEM). The LockBit ransomware group…

Social engineering attacks target Okta customers to achieve a highly privileged role

2 years ago

Identity services provider Okta warned customers of social engineering attacks carried out by threat actors to obtain elevated administrator permissions.…

Talos wars of customizations of the open-source info stealer SapphireStealer

2 years ago

Cisco reported that multiple threat actors are customizing the SapphireStealer information stealer after the leak of its source code. Cisco…

This website uses cookies.