Bug hunter Thomas Orlita discovered an XSS vulnerability in Google's Invoice Submission Portal that would have allowed attackers access to…
Cybercriminals are attempting to exploit an API misconfiguration in Docker containers to infiltrate them and run the Linux bot AESDDoS.…
Experts at Dragos firm reported that Xenotime threat actor behind the 2017 Trisis/Triton malware attack is targeting electric utilities in…
Mozilla released security updates for the Thunderbird email client that address vulnerabilities that could allow code execution on impacted systems. …
Good news for the victims of the pyLocky Ransomware versions 1 and 2, French authorities have released the pyLocky decryptor…
The Cybaze-Yoroi ZLab analyzed a new sample of Nanocore Remote Administrator Tools (RAT) using a Delphi wrapper to protect its code. Introduction…
Yubico is replacing YubiKey FIPS security keys due to a serious flaw that makes cryptographic operations easier to crack under…
Hackers are targeting millions of mail servers running vulnerable Exim mail transfer agent (MTA) versions, threat actors leverage the CVE-2019-10149…
A security expert at SEC Consult discovered that some WAGO industrial managed switches are affected by several serious vulnerabilities. A…
Malware infections could be devastating for production environments, a ransomware infection halts production operations for days at airplane parts manufacturer…
This website uses cookies.