hacking news

Experts warn of a coordinated surge in the exploitation attempts of SSRF vulnerabilities

Researchers warn of a "coordinated surge" in the exploitation attempts of SSRF vulnerabilities in multiple platforms. Threat intelligence firm GreyNoise…

12 months ago

Medusa ransomware hit over 300 critical infrastructure organizations until February 2025

The Medusa ransomware operation hit over 300 organizations in critical infrastructure sectors in the United States until February 2025. The…

12 months ago

China-linked APT UNC3886 targets EoL Juniper routers

Mandiant researchers warn that China-linked actors are deploying custom backdoors on Juniper Networks Junos OS MX routers. In mid-2024, Mandiant identified…

12 months ago

U.S. CISA adds six Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds six Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity…

12 months ago

Microsoft Patch Tuesday security updates for March 2025 fix six actively exploited zero-days

Microsoft Patch Tuesday security updates for March 2025 address 56 security vulnerabilities in its products, including six actively exploited zero-days.…

12 months ago

New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job?

The Ballista botnet is exploiting an unpatched TP-Link vulnerability, targeting over 6,000 Archer routers, Cato CTRL researchers warn. Cato CTRL…

12 months ago

Switzerland’s NCSC requires cyberattack reporting for critical infrastructure within 24 hours

Switzerland's NCSC mandates critical infrastructure organizations to report cyberattacks within 24 hours of discovery. Switzerland's National Cybersecurity Centre (NCSC) now…

12 months ago

SideWinder APT targets maritime and nuclear sectors with enhanced toolset

The APT group SideWinder targets maritime and logistics companies across South and Southeast Asia, the Middle East, and Africa. Kaspersky…

12 months ago

U.S. CISA adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog. The U.S.…

12 months ago

Cybersecurity Challenges in Cross-Border Data Transfers and Regulatory Compliance Strategies

Cross-border data transfers enable global business but face challenges from varying cybersecurity laws, increasing risks of cyberattacks and data breaches.…

12 months ago

This website uses cookies.