Security Affairs newsletter Round 235

6 years ago

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs Hi folk, let…

A new Mac malware dubbed Tarmac has been distributed via malvertising campaigns

6 years ago

Confiant researchers have discovered a new Mac malware dubbed Tarmac distributed via malvertising campaigns in the US, Italy, and Japan.…

Leafly Cannabis information platform suffered a data leak

6 years ago

Leafly, a cannabis information platform, suffered a data leak that exposed the personal information of some of its customers. Leafly,…

FIN7 Hackers group is back with a new loader and a new RAT

6 years ago

FireEye Mandiant discovered that the FIN7 hacking group added new tools to its cyber arsenal, including a module to target…

SIM cards used in 29 countries are vulnerable to Simjacker attack

6 years ago

Security researchers at Adaptive Mobile who discovered the SimJacker issue have published the list of countries where mobile operators use…

Tens of million PCs potentially impacted by a flaw in HP Touchpoint Analytics

6 years ago

SafeBreach experts discovered that the HP Touchpoint Analytics service is affected by a potentially serious vulnerability. Security researchers at SafeBreach…

Researchers released a free decryptor for the Nemty Ransomware

6 years ago

Good news for the victims of the Nemty Ransomware, security researchers have released a free decryptor that could be used…

Top cybersecurity certifications to consider for your IT career

6 years ago

With the right cybersecurity certifications, you can attain your goals seamlessly and in a fast way and speed up your…

Hacker breached escort forums in Italy and the Netherlands and is selling user data

6 years ago

Popular prostitution and escort forums in Italy and the Netherlands have been hacked and data have been offered for sale…

Sophos fixed a critical vulnerability in Cyberoam firewalls

6 years ago

A vulnerability in Sophos Cyberoam firewalls could be exploited by an attacker to gain access to a target’s internal network…

This website uses cookies.