Expired certificate caused a Pulse Secure VPN global scale outage

5 years ago

Pulse Secure VPN users were not able to login due to the expiration of a code signing certificate used to…

Two former NSA Officials appointed by Joe Biden for prominent cyber roles

5 years ago

President Joe Biden has appointed two former senior NSA officials for two prominent cyber roles in his administration. President Joe…

Microsoft is open sourcing CyberBattleSim Enterprise Environment Simulator

5 years ago

Microsoft released as open-source the 'CyberBattleSim Python-based toolkit which is an Enterprise Environment Simulator. Microsoft has recently announced the open-source…

LinkedIn confirmed that it was not a victim of a data breach

5 years ago

LinkedIn has formally denied that the recently disclosed data leak was caused by a security breach, data were obtained via…

Fitch Ratings: Cyberattacks could pose a material risk to water and sewer utilities

5 years ago

Fitch Ratings is warning that cyberattacks could pose a risk to water and sewer utilities potentially impacting their ability to…

Is the recent accident at Iran Natanz nuclear plant a cyber attack?

5 years ago

On Sunday, an "accident" occurred in the electricity distribution network at Iran's Natanz nuclear facility, experts speculate it was caused…

Personal data of 1.3 million Clubhouse users leaked online

5 years ago

An SQL database containing the personal data of 1.3 million Clubhouse users was leaked online for free, a few days…

Security Affairs newsletter Round 309

5 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

Joker malware infected 538,000 Huawei Android devices

5 years ago

More than 500,000 Huawei users have been infected with the Joker malware after downloading apps from the company’s official Android…

Hackers compromised APKPure client to distribute infected Apps

5 years ago

APKPure, one of the largest alternative app stores, was the victim of a supply chain attack, threat actors compromised client…

This website uses cookies.