Security Affairs newsletter Round 362 by Pierluigi Paganini

4 years ago

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…

T-Mobile confirms Lapsus$ had access its systems

4 years ago

Telecommunication giant T-Mobile confirmed the LAPSUS$ extortion group gained access to its networks in March. Telecom company T-Mobile on Friday revealed that…

Are you using Java 15/16/17 or 18 in production? Patch them now!

4 years ago

A researcher has released proof-of-concept (PoC) code for a digital signature bypass vulnerability in Java. Security researcher Khaled Nassar released…

Phishing attacks using the topic “Azovstal” targets entities in Ukraine

4 years ago

Ukraine CERT-UA warns of phishing attacks on state organizations of Ukraine using the topic "Azovstal" and Cobalt Strike Beacon. The…

Conti ransomware claims responsibility for the attack on Costa Rica

4 years ago

Conti ransomware gang claimed responsibility for a ransomware attack that hit the government infrastructure of Costa Rica. Last week a…

Cyber Insurance and the Changing Global Risk Environment

4 years ago

When security fails, cyber insurance can become crucial for ensuring continuity. Cyber has changed everything around us - even the…

A stored XSS flaw in RainLoop allows stealing users’ emails

4 years ago

Experts disclose an unpatched vulnerability in the RainLoop webmail client, tracked as CVE-2022-29360, that can be exploited to steal users'…

QNAP firmware updates fix Apache HTTP vulnerabilities in its NAS

4 years ago

Taiwanese vendor QNAP warns users to update their NAS Firmware to fix Apache HTTP flaws addressed in the Apache HTTP…

Pwn2Own Miami hacking contest awarded $400,000 for 26 unique ICS exploits

4 years ago

Which hat hackers that participated in the Pwn2Own Miami 2022 hacking contest earned a total of $400,000 for their ICS…

Lemon_Duck cryptomining botnet targets Docker servers

4 years ago

The Lemon_Duck cryptomining botnet is targeting Docker servers to mine cryptocurrency on Linux systems. Crowdstrikes researchers reported that the Lemon_Duck cryptomining botnet…

This website uses cookies.