Cisco fixed a critical Bypass Authentication flaw in Cisco ESA and Secure Email and Web Manager

3 years ago

Cisco addressed a critical bypass authentication flaw in Cisco Email Security Appliance (ESA) and Secure Email and Web Manager. Cisco…

Malicious apps continue to spread through the Google Play Store

3 years ago

Researchers at antivirus firm Dr. Web discovered malware in the Google Play Store that was downloaded two million times. An…

Hertzbleed Side-Channel Attack allows to remotely steal encryption keys from AMD and Intel chips

3 years ago

Hertzbleed attack: Researchers discovered a new vulnerability in modern Intel and AMD chips that could allow attackers to steal encryption…

A critical flaw in Citrix Application Delivery Management allows resetting admin passwords

3 years ago

Citrix fixed a critical flaw in Citrix Application Delivery Management (ADM), tracked as CVE-2022-27511, that can allow attackers to reset…

Panchan Golang P2P botnet targeting Linux servers in cryptomining campaign

3 years ago

Researchers discovered a new Golang-based peer-to-peer (P2P) botnet, dubbed Panchan, targeting Linux servers in the education sector since March 2022.…

Let’s give a look at the Dark Web Price Index 2022

3 years ago

PrivacyAffairs released the Dark Web Index 2022, the document provides the prices for illegal services/products available in the black marketplaces.…

A flaw in Zimbra email suite allows stealing login credentials of the users

3 years ago

A high-severity vulnerability in the Zimbra email suite could be exploited by an unauthenticated attacker to steal login credentials of…

API Security Best Practices

3 years ago

Organizations face the constant need to protect these APIs from attacks so they can protect organizational data. Organizations are rapidly…

SeaFlower campaign distributes backdoored versions of Web3 wallets to steal seed phrases

3 years ago

Chinese cybercriminals are using SeaFlower backdoored versions of iOS and Android Web3 wallets to steal users’ seed phrase. Researchers from…

Experts spotted Syslogk, a Linux rootkit under development

3 years ago

Experts spotted a new Linux rootkit, dubbed ‘Syslogk,’ that uses specially crafted "magic packets" to activate a dormant backdoor on the…

This website uses cookies.