A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…
Google released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in the wild. Google…
Qualys researchers demonstrated how to chain a new Linux flaw with two other two issues to gain full root privileges…
Threat actors could exploit drones for payload delivery, kinetic operations, and even diversion, experts warn. Original post at https://cybernews.com/security/drones-hack-airborne-cybersecurity-nightmare/ Once…
Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of…
Experts found multiple flaws in three Android Keyboard apps that can be exploited by remote attackers to compromise a mobile…
Redigo is a new Go-based malware employed in attacks against Redis servers affected by the CVE-2022-0543 vulnerability. Researchers from security firm…
Data breaches can be devastating for organizations, these are 3 of the worst incidents that could have been prevented Data…
North Korea-linked ScarCruft group used a previously undocumented backdoor called Dolphin against targets in South Korea. ESET researchers discovered a previously undocumented backdoor called Dolphin…
LastPass disclosed a new security breach, threat actors had access to its cloud storage using information stolen in the August…
This website uses cookies.