Ivanti fixed a new critical Sentry API authentication bypass flaw

3 years ago

Ivanti warned customers of a new critical Sentry API authentication bypass vulnerability tracked as CVE-2023-38035. The software company Ivanti released…

BlackCat ransomware group claims the hack of Seiko network

3 years ago

The BlackCat/ALPHV ransomware group claims to have hacked the Japanese maker of watches Seiko and added the company to its…

New HiatusRAT campaign targets Taiwan and U.S. military procurement system

3 years ago

HiatusRAT malware operators resurfaced with a new wave of attacks targeting Taiwan-based organizations and a U.S. military procurement system. In…

Spoofing an Apple device and tricking users into sharing sensitive data

3 years ago

White hat hackers at the recent hacking conference Def Con demonstrated how to spoof an Apple device and trick users…

Israel and US to Invest $3.85 Million in projects for critical infrastructure protection through the BIRD Cyber Program

3 years ago

Israel and US government agencies announced the BIRD Cyber Program, an investment of roughly $4M in projects to enhance the…

N. Korean Kimsuky APT targets S. Korea-US military exercises

3 years ago

North Korea-linked APT Kimsuky launched a spear-phishing campaign targeting US contractors working at the war simulation centre. North Korea-linked APT…

Four Juniper Junos OS flaws can be chained to remotely hack devices

3 years ago

Juniper Networks addressed multiple flaws in the J-Web component of Junos OS that could be chained to achieve remote code…

Security Affairs newsletter Round 433 by Pierluigi Paganini – International edition

3 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

Cybersecurity: CASB vs SASE

3 years ago

Understanding cybersecurity aspects addressed by Cloud Access Security Broker (CASB) and Secure Access Service Edge (SASE) In an increasingly digital…

Over 3,000 Android Malware spotted using unsupported/unknown compression methods to avoid detection

3 years ago

Threat actors are using Android Package (APK) files with unsupported compression methods to prevent malware analysis. On June 28th, researchers…

This website uses cookies.