CISA and NIST published a report on software supply chain attacks that shed light on the associated risks and provide…
Apple addresses a zero-day in macOS exploited by Shlayer malware to bypass Apple's security features and deliver second-stage malicious payloads. Apple…
Experts found a bug in Apple's wireless file-sharing protocol Apple AirDrop that could expose user's contact information. Boffins from the…
European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows…
Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts…
The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another…
Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…
This website uses cookies.