information security news

VMware addresses critical flaws in its products

VMware has addressed a critical vulnerability that affects multiple products that could be exploited to gain access to confidential information.…

5 years ago

BlackMatter ransomware also targets VMware ESXi servers

BlackMatter gang rapidly evolves, the group has developed a Linux version that allows operators to targets VMware's ESXi VM platform.…

5 years ago

Conti ransomware affiliate leaked gang’s training material and tools

An affiliate of the Conti RaaS has leaked the training material shared by the group with its network along with…

5 years ago

Cryptominer ELFs Using MSR to Boost Mining Process

The Uptycs Threat Research Team recently observed Golang-based worm dropping cryptominer binaries which use the MSR (Model Specific Register) driver.  By UPTYCS THREAT…

5 years ago

Italian energy company ERG hit by LockBit 2.0 ransomware gang

ERG SPA, an Italian energy company, reports a minor impact on its operations after the recent ransomware attack conducted by LockBit 2.0…

5 years ago

Cisco fixes critical, high severity vulnerabilities in VPN routers

Cisco fixed critical, high severity pre-auth security vulnerabilities impacting multiple Small Business VPN routers. Cisco addressed critical and high severity…

5 years ago

China-linked APT31 targets Russia for the first time

China-linked APT31 group employed a new strain of malware in attacks aimed at entities in Mongolia, Belarus, Canada, the US,…

5 years ago

Cyber Defense Magazine – August 2021 has arrived. Enjoy it!

Cyber Defense Magazine August 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 148 pages of…

5 years ago

China-linked APT groups target telecom companies in Southeast Asia

China linked APT groups have targeted networks of at least five major telecommunications companies operating in Southeast Asia since 2017.…

5 years ago

Experts found potential remote code execution in PyPI

A flaw in the GitHub Actions workflow for PyPI ’s source repository could be exploited to potentially execute arbitrary code…

5 years ago

This website uses cookies.