information security news

Security Affairs newsletter Round 353

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…

4 years ago

Organizations are addressing zero-day vulnerabilities more quickly, says Google

Organizations are addressing zero-day vulnerabilities more quickly, compared to last year, Google’s Project Zero reported. According to Google’s Project Zero…

4 years ago

CISA, FBI, NSA warn of the increased globalized threat of ransomware

CISA, FBI and NSA published a joint advisory warning of ransomware attacks targeting critical infrastructure organizations. Cybersecurity agencies from the…

4 years ago

Croatian phone carrier A1 Hrvatska discloses data breach

Croatian phone carrier A1 Hrvatska has disclosed a data breach that has impacted roughly 200,000 customers. Croatian phone carrier A1…

4 years ago

FritzFrog P2P Botnet is back and targets Healthcare, Education and Government Sectors

FritzFrog P2P botnet is back and is targeting servers belonging to entities in the healthcare, education, and government sectors. FritzFrog…

4 years ago

CISA adds 15 new vulnerabilities to its Known Exploited Vulnerabilities Catalog

The U.S. CISA has added to the catalog of vulnerabilities another 15 security vulnerabilities actively exploited in the wild. The…

4 years ago

Apple addressed a third zero-day in 2022, which is actively exploited

Apple addressed a new WebKit zero-day affecting iOS, iPadOS, macOS, and Safari that may have been actively exploited in the wild. Apple…

4 years ago

Spanish police dismantled SIM swapping gang who stole money from victims’ bank accounts

Spanish National Police arrested eight alleged members of a crime ring specialized in SIM swapping attacks. Spanish National Police has…

4 years ago

Threat actors compromised +500 Magento-based e-stores with e-skimmers

Experts uncovered a mass Magecart campaign that compromised over 500 e-store running the Magento 1 eCommerce platform. Researchers from cybersecurity…

4 years ago

Attackers Increasingly Adopting Regsvr32 Utility Execution Via Office Documents

The Uptycs threat research team has been observing an increase in utilization of regsvr32.exe heavily via various types of Microsoft…

4 years ago

This website uses cookies.