Frebniis malware abuses Microsoft IIS feature to create a backdoor

3 years ago

Experts spotted a malware dubbed Frebniis that abuses a Microsoft IIS feature to deploy a backdoor and monitor all HTTP…

ENISA and CERT-EU warns Chinese APTs targeting EU organizations

3 years ago

A joint report published by ENISA and CERT-EU warns of Chinese APTs targeting businesses and government organizations in the European…

Hackers disclose Atlassian data after the theft of an employee’s credentials

3 years ago

Atlassian discloses a data leak that was caused by the theft of employee credentials which was used to steal data…

Security Affairs newsletter Round 407 by Pierluigi Paganini

3 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

Twitter will allow using the SMS-based two-factor authentication (2FA) only to its Blue subscribers

3 years ago

Twitter has announced that the platform will allow using the SMS-based two-factor authentication (2FA) only to its Blue subscribers. To…

GoDaddy discloses a new data breach

3 years ago

GoDaddy discloses a security breach, threat actors have stolen source code and installed malware on its servers in a long-runing…

Fortinet fixes critical vulnerabilities in FortiNAC and FortiWeb

3 years ago

Cybersecurity vendor Fortinet has addressed two critical vulnerabilities impacting its FortiNAC and FortiWeb products. Cybersecurity firm Fortinet has released security…

German airport websites hit by DDos attacks once again

3 years ago

Experts are investigating the failures of several German airports after some media attributed them to a possible hacking campaign. On…

Cisco fixed critical RCE bug in ClamAV Open-Source Antivirus engine

3 years ago

Cisco addressed a critical vulnerability in the ClamAV open source antivirus engine that can lead to remote code execution on…

CISA adds Cacti, Office, Windows and iOS bugs to its Known Exploited Vulnerabilities Catalog

3 years ago

US CISA added actively exploited flaws in Cacti framework, Microsoft Office, Windows, and iOS to its Known Exploited Vulnerabilities Catalog.…

This website uses cookies.