Hackers stole personnel records of software developer Wind River

5 years ago

The global leader of embedded system software Wind River Systems discloses a data breach that resulted in the theft of…

Cyber Defense Magazine – February 2021 has arrived. Enjoy it!

5 years ago

Cyber Defense Magazine February 2021 Edition has arrived. We hope you enjoy this month's edition…packed with over 108 pages of…

Police Exam Database Exposes 500K Indian Citizens ’ PII

5 years ago

CloudSEK has discovered a post on a well-known database sharing forum advertising the PII of 500,000 Indian citizens. While the…

Kobalos, a complex Linux malware targets high-performance computing clusters

5 years ago

ESET experts uncovered a previously undocumented piece of malware that had been observed targeting high-performance computing clusters (HPC). ESET analyzed…

Ransomware operators exploit VMWare ESXi flaws to encrypt disks of VMs

5 years ago

Ransomware operators are exploiting two VMWare ESXi vulnerabilities, CVE-2019-5544 and CVE-2020-3992, to encrypt virtual hard disks. Security experts are warning…

CISA: Many victims of SolarWinds hackers had no direct connection to SolarWinds

5 years ago

The U.S. CISA reveals that many of the victims of the SolarWinds hackers had no direct connection to SolarWinds. The…

Experts discovered a new Trickbot module used for lateral movement

5 years ago

Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target…

Operation NightScout: supply chain attack on NoxPlayer Android emulator

5 years ago

Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and…

Experts warn of active exploitation of SonicWall zero-day in the wild

5 years ago

Researchers from the security firm NCC Group warn of the exploitation in the wild of a SonicWall zero-day vulnerability. Security…

Google discloses a severe flaw in widely used Libgcrypt encryption library

5 years ago

Google discovered a flaw in GNU Privacy Guard (GnuPG)'s Libgcrypt encryption library that could be exploited to get remote code…

This website uses cookies.