CISA adds Atlassian Bitbucket Server flaw to its Known Exploited Vulnerabilities Catalog

3 years ago

CISA added a recently disclosed flaw in Atlassian Bitbucket Server, tracked as CVE-2022-36804, to its Known Exploited Vulnerabilities Catalog. The U.S.…

Guacamaya hacktivists stole sensitive data from Mexico and Latin American countries

3 years ago

A hacker group called Guacamaya stole classified government information from multiple military and government agencies across several Latin American countries.…

Luxury hotel chain Shangri-La suffered a security breach

3 years ago

The Shangri-La hotel group disclosed a data breach, a database containing the personal information of its customers was compromised. The…

Witchetty APT used steganography in attacks against Middle East entities

3 years ago

A cyberespionage group, tracked as Witchetty, used steganography to hide a previously undocumented backdoor in a Windows logo. Broadcom's Symantec…

US DoD announced the results of the Hack US bug bounty challenge

3 years ago

The US Department of Defense (DoD) shared the results of the Hack US bug bounty program that took place in July.…

Microsoft confirms Exchange zero-day flaws actively exploited in the wild

3 years ago

Microsoft confirmed that two recently disclosed zero-day flaws in Microsoft Exchange are being actively exploited in the wild. Microsoft confirmed…

Unpatched Microsoft Exchange Zero-Day actively exploited in the wild

3 years ago

Security researchers are warning of a new Microsoft Exchange zero-day that are being exploited by malicious actors in the wild.…

Experts uncovered novel Malware persistence within VMware ESXi Hypervisors

3 years ago

Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors. Mandiant detailed a novel technique used…

Hacker groups support protestors in Iran using Telegram, Signal and Darkweb

3 years ago

Several hacker groups are assisting protestors in Iran using Telegram, Signal and other tools to bypass government censorship. Check Point…

A cracked copy of Brute Ratel post-exploitation tool leaked on hacking forums

3 years ago

The Brute Ratel post-exploitation toolkit has been cracked and now is available in the underground hacking and cybercrime communities. Threat…

This website uses cookies.