Information Security

CISA, NIST published an advisory on supply chain attacks

CISA and NIST published a report on software supply chain attacks that shed light on the associated risks and provide…

3 years ago

Shlayer macOS malware abuses zero-day to bypass Gatekeeper feature

Apple addresses a zero-day in macOS exploited by Shlayer malware to bypass Apple's security features and deliver second-stage malicious payloads. Apple…

3 years ago

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Experts found a bug in Apple's wireless file-sharing protocol Apple AirDrop that could expose user's contact information. Boffins from the…

3 years ago

Bye Bye Emotet, law enforcement pushed the uninstall code via the botnet

European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows…

3 years ago

Prometei botnet is targeting ProxyLogon Microsoft Exchange flaws

Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts…

3 years ago

A supply chain attack compromised the update mechanism of Passwordstate Password Manager

The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another…

3 years ago

Hackers are targeting Soliton FileZen file-sharing servers

Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government…

3 years ago

Security Affairs newsletter Round 311

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

3 years ago

Security Affairs newsletter Round 310

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

3 years ago

Multi-platform Tycoon Ransomware employed in targeted attacks

Experts recently discovered a multi-platform ransomware, dubbed Tycoon Ransomware, that uses a Java image file (JIMAGE) to evade detection. Experts…

4 years ago

This website uses cookies.