Cybersecurity

Apr 03 – Apr 09 Ukraine – Russia the silent cyber conflictApr 03 – Apr 09 Ukraine – Russia the silent cyber conflict

Apr 03 – Apr 09 Ukraine – Russia the silent cyber conflict

This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective.…

3 years ago
Anonymous targets the Russian Military and State Television and Radio propagandaAnonymous targets the Russian Military and State Television and Radio propaganda

Anonymous targets the Russian Military and State Television and Radio propaganda

Anonymous continues to support Ukraine against the Russian criminal invasion targeting the Russian military and propaganda. Anonymous leaked personal details…

3 years ago
VMware released updates to fix the Spring4Shell vulnerability in multiple productsVMware released updates to fix the Spring4Shell vulnerability in multiple products

VMware released updates to fix the Spring4Shell vulnerability in multiple products

VMware released security updates to address the critical remote code execution vulnerability known as Spring4Shell. VMware has published security updates…

3 years ago
Borat RAT, a new RAT that performs ransomware and DDoS attacksBorat RAT, a new RAT that performs ransomware and DDoS attacks

Borat RAT, a new RAT that performs ransomware and DDoS attacks

Cyble researchers discovered a new remote access trojan (RAT) named Borat capable of conducting DDoS and ransomware attacks. Researchers from…

3 years ago
Experts discovered 15-Year-Old vulnerabilities in the PEAR PHP repositoryExperts discovered 15-Year-Old vulnerabilities in the PEAR PHP repository

Experts discovered 15-Year-Old vulnerabilities in the PEAR PHP repository

SonarSource discovered a 15-year-old flaw in the PEAR PHP repository that could have enabled supply chain attacks. Researchers from SonarSource…

3 years ago
CISA adds 66 new flaws to the Known Exploited Vulnerabilities CatalogCISA adds 66 new flaws to the Known Exploited Vulnerabilities Catalog

CISA adds 66 new flaws to the Known Exploited Vulnerabilities Catalog

The US Cybersecurity and Infrastructure Security Agency (CISA) added 66 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S.…

3 years ago
Experts explained how to hack a building controller widely adopted in RussiaExperts explained how to hack a building controller widely adopted in Russia

Experts explained how to hack a building controller widely adopted in Russia

A researcher discovered critical flaws that can be exploited by remote attackers to hack a building controller popular in Russia.…

3 years ago
Anonymous continues to support Ukraine against RussiaAnonymous continues to support Ukraine against Russia

Anonymous continues to support Ukraine against Russia

The collective Anonymous and its affiliated groups continue to target the Russian government and private organizations. The collective Anonymous, and…

3 years ago
Russia-linked threats actors exploited default MFA protocol and PrintNightmare bug to compromise NGO cloudRussia-linked threats actors exploited default MFA protocol and PrintNightmare bug to compromise NGO cloud

Russia-linked threats actors exploited default MFA protocol and PrintNightmare bug to compromise NGO cloud

FBI and CISA warn Russia-linked threats actors gained access to an NGO cloud after enrolling their own device in the…

3 years ago
Critical flaws affect Veeam Data Backup softwareCritical flaws affect Veeam Data Backup software

Critical flaws affect Veeam Data Backup software

Veeam addressed two critical vulnerabilities impacting the Backup & Replication product for virtual environments. Veeam has released security patches to…

3 years ago