A critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD systems. The maintainers…
The North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the AppleJeus malware. Volexity…
Law enforcement agencies can extract data from the infotainment systems of thousands of different car models. Data managed by infotainment…
US DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit multiple high-profile companies.…
Experts spotted a new data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor's offices and courts. Researchers…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…
Google released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in the wild. Google…
Qualys researchers demonstrated how to chain a new Linux flaw with two other two issues to gain full root privileges…
Threat actors could exploit drones for payload delivery, kinetic operations, and even diversion, experts warn. Original post at https://cybernews.com/security/drones-hack-airborne-cybersecurity-nightmare/ Once…
Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of…
This website uses cookies.