You searched for: Pierluigi Paganini

Google discovered a new variant of Rowhammer attack dubbed Half-Double

Google experts discovered a new variant of Rowhammer attack against RAM memory cards that bypasses all current defenses Google researchers…

5 years ago

Belgium Interior Ministry said it was hit by a sophisticated cyber attack

The Belgian interior ministry was targeted by a "sophisticated" cyber attack, a spokesman told RTBF public television on Tuesday.  The…

5 years ago

Another critical bug impacts all VMware vCenter Server installs

VMware addresses a critical remote code execution (RCE) flaw in the Virtual SAN Health Check plug-in that impacts all vCenter…

5 years ago

Agrius group targets Israel with data-wipers disguised as ransomware

An Iran-linked threat actor tracked as Agrius employed data-wipers disguised as ransomware to destroy targeted IT infrastructure. Researchers from cyber-security…

5 years ago

Ivanti fixes high severity flaw in Pulse Connect Secure VPN

A flaw in Pulse Connect Secure VPN could allow an authenticated remote attacker to execute arbitrary code with elevated privileges.…

5 years ago

Trend Micro fixes 3 flaws in Home Network Security Devices

Trend Micro fixed some flaws in Trend Micro Home Network Security devices that could be exploited to elevate privileges or…

5 years ago

Apple addresses three zero-day flaws actively exploited in the wild

Apple has addressed three zero-day vulnerabilities in macOS and tvOS actively exploited in the wild by threat actors. Apple has…

5 years ago

Audio equipment maker Bose Corporation discloses a ransomware attack

The audio equipment manufacturer Bose Corporation said it was the victim of a ransomware attack that took place earlier this…

5 years ago

US banks are giving facial recognition a go; EU tightens regulations, FTC updates AI guidelines

US banks are giving the green light to the adoption of facial recognition technology, while authorities provide regulations and updates…

5 years ago

French intel found flaws in Bluetooth Core and Mesh specs

Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at…

5 years ago

This website uses cookies.