Crooks stole $375k from Premint NFT, it is one of the biggest NFT hacks ever

3 years ago

Threat actors hacked the popular NFT platform, Premint NFT and stole 314 NFTs. The popular NFT platform, Premint NFT, was…

Google is going to remove App Permissions List from the Play Store

3 years ago

Google is going to remove the app permissions list from the official Play Store for both the mobile app and…

Security Affairs newsletter Round 374 by Pierluigi Paganini

3 years ago

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for…

APT groups target journalists and media organizations since 2021

3 years ago

Researchers from Proofpoint warn that various APT groups are targeting journalists and media organizations since 2021. Proofpoint researchers warn that…

Critical flaw in Netwrix Auditor application allows arbitrary code execution

3 years ago

A vulnerability in the Netwrix Auditor software can be exploited to execute arbitrary code on affected devices. Bishop Fox discovered…

CISA urges to fix multiple critical flaws in Juniper Networks products

3 years ago

CISA urges admins to apply recently released fixes in Juniper Networks products, including Junos Space, Contrail Networking and NorthStar Controller.…

Threat actors exploit a flaw in Digium Phone Software to target VoIP servers

3 years ago

Threat actors are targeting VoIP servers by exploiting a vulnerability in Digium's software to install a web shell, Palo Alto…

Tainted password-cracking software for industrial systems used to spread P2P Sality bot

3 years ago

Dragos researchers uncovered a small-scale campaign targeting industrial engineers and operators with Sality malware. During a routine vulnerability assessment, Dragos…

Experts warn of attacks on sites using flawed Kaswara Modern WPBakery Page Builder Addons

3 years ago

Researchers spotted a massive campaign that scanned close to 1.6 million WordPress sites for vulnerable Kaswara Modern WPBakery Page Builder…

Holy Ghost ransomware operation is linked to North Korea

3 years ago

Microsoft researchers linked the Holy Ghost ransomware (H0lyGh0st) operation to North Korea-linked threat actors. The Microsoft Threat Intelligence Center (MSTIC)…

This website uses cookies.