IT Information Security

Security Affairs newsletter Round 431 by Pierluigi Paganini – International edition

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

3 years ago

BlueCharlie changes attack infrastructure in response to reports on its activity

Russia-linked APT group BlueCharlie was observed changing its infrastructure in response to recent reports on its activity. Researchers from Recorded…

3 years ago

Reptile Rootkit employed in attacks against Linux systems in South Korea

Researchers observed threat actors that are using an open-source rootkit called Reptile in attacks aimed at systems in South Korea. Reptile is…

3 years ago

New PaperCut flaw in print management software exposes servers to RCE attacks

Researchers discovered a vulnerability in PaperCut NG/MF print management software that can lead to remote code execution. Cybersecurity researchers at…

3 years ago

A cyberattack impacted operations of multiple hospitals in several US states

A cyberattack has disrupted the computer systems of multiple hospitals in several states, with a severe impact on their operations.…

3 years ago

Malicious packages in the NPM designed for highly-targeted attacks

Researchers discovered a new set of malicious packages on the npm package manager that can exfiltrate sensitive developer data. On…

3 years ago

Attackers use dynamic code loading to bypass Google Play store’s malware detections

Threat actors rely on the 'versioning' technique to evade malware detections of malicious code uploaded to the Google Play Store.…

3 years ago

CISA, FBI, and NSA published the list of 12 most exploited vulnerabilities of 2022

CISA, the FBI, and NSA, along with Five Eyes cybersecurity agencies published a list of the 12 most exploited vulnerabilities…

3 years ago

Decommissioned medical infusion pumps sold on secondary market could reveal Wi-Fi configuration settings

Experts warn that decommissioned medical infusion pumps sold via the secondary market could expose Wi-Fi configuration settings. The sale of…

3 years ago

OWASP Top 10 for LLM (Large Language Model) applications is out!

The OWASP Top 10 for LLM (Large Language Model) Applications version 1.0 is out, it focuses on the potential security risks…

3 years ago

This website uses cookies.