Experts warn of attacks exploiting zero-day in WordPress BackupBuddy plugin

3 years ago

Threat actors are exploiting a zero-day vulnerability in a WordPress plugin called BackupBuddy, Wordfence researchers warned. On September 6, 2022, the…

Iran-linked DEV-0270 group abuses BitLocker to encrypt victims’ devices

3 years ago

Iran-linked APT group DEV-0270 (aka Nemesis Kitten) is abusing the BitLocker Windows feature to encrypt victims' devices. Microsoft Security Threat…

CISA adds 12 new flaws to its Known Exploited Vulnerabilities Catalog

3 years ago

CISA added 12 more security flaws to its Known Exploited Vulnerabilities Catalog including four D-Link vulnerabilities. The U.S. Cybersecurity and Infrastructure…

Classified NATO documents sold on darkweb after they were stolen from Portugal

3 years ago

Threat actors claimed to have stolen classified NATO documents from the Armed Forces General Staff agency of Portugal (EMGFA). After…

North Korea-linked Lazarus APT targets energy providers around the world

3 years ago

North Korea-linked Lazarus APT group is targeting energy providers around the world, including organizations in the US, Canada, and Japan. Talos researchers…

Cisco will not fix the authentication bypass flaw in EoL routers

3 years ago

Cisco fixed new security flaws affecting its products, including a recently disclosed high-severity issue in NVIDIA Data Plane Development Kit. The most…

Ex-members of the Conti ransomware gang target Ukraine

3 years ago

Some members of the Conti ransomware gang were involved in financially motivated attacks targeting Ukraine from April to August 2022.…

Albania interrupted diplomatic ties with Iran over the mid-July attack

3 years ago

Albania interrupted diplomatic ties with Iran and expelled the country’s embassy staff over the mid-July attack. Albanian Prime Minister Edi…

Experts spotted a new stealthy Linux malware dubbed Shikitega

3 years ago

A new Linux malware dubbed Shikitega leverages a multi-stage infection chain to target endpoints and IoT devices. Researchers from AT&T Alien Labs…

Challenges of User Authentication: What You Need to Know

3 years ago

In the digital age, authentication is paramount to a strong security strategy. Which are the challenges of user authentication? In…

This website uses cookies.