it security

Critical flaw could have allowed attackers to control traffic lightsCritical flaw could have allowed attackers to control traffic lights

Critical flaw could have allowed attackers to control traffic lights

A critical vulnerability in traffic light controllers manufactured by SWARCO could have been exploited by attackers to disrupt traffic lights.…

5 years ago
New Cyber Operation Targets Italy: Digging Into the Netwire Attack ChainNew Cyber Operation Targets Italy: Digging Into the Netwire Attack Chain

New Cyber Operation Targets Italy: Digging Into the Netwire Attack Chain

ZLab malware researchers analyzed the attack chain used to infect Italian speaking victims with the Netwire malware. Introduction Info stealer…

5 years ago
Cyber Defense Magazine – June 2020 has arrived. Enjoy it!Cyber Defense Magazine – June 2020 has arrived. Enjoy it!

Cyber Defense Magazine – June 2020 has arrived. Enjoy it!

Cyber Defense Magazine June 2020 Edition has arrived. We hope you enjoy this month's edition…packed with over 165 pages of…

5 years ago
Google reveals that foreign hackers are already targeting Trump and Biden campaignsGoogle reveals that foreign hackers are already targeting Trump and Biden campaigns

Google reveals that foreign hackers are already targeting Trump and Biden campaigns

Google researchers revealed that campaign staffs for both President Donald Trump and Joe Biden have been targeted recently by foreign…

5 years ago
Large-scale campaign targets configuration files from WordPress sitesLarge-scale campaign targets configuration files from WordPress sites

Large-scale campaign targets configuration files from WordPress sites

Security experts have observed a large-scale campaign over the weekend aimed at stealing configuration files from WordPress sites. Security researchers…

5 years ago
Two issues in Zoom could have allowed code executionTwo issues in Zoom could have allowed code execution

Two issues in Zoom could have allowed code execution

Researchers from Cisco Talos disclosed two critical flaws in the Zoom software that could have allowed attackers to hack into the systems…

5 years ago
Russia-linked APT exploited at least 3 Exim flaws in recent attacksRussia-linked APT exploited at least 3 Exim flaws in recent attacks

Russia-linked APT exploited at least 3 Exim flaws in recent attacks

Several flaws in the Exim mail transfer agent (MTA) have been exploited by Russia-linked hackers, hundreds of thousands of servers…

5 years ago
IP-in-IP flaw affects devices from Cisco and other vendorsIP-in-IP flaw affects devices from Cisco and other vendors

IP-in-IP flaw affects devices from Cisco and other vendors

A flaw in the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls impact…

5 years ago
There was no data breach in the cyberattack against Minneapolis PoliceThere was no data breach in the cyberattack against Minneapolis Police

There was no data breach in the cyberattack against Minneapolis Police

Last week a massive distributed denial-of-service (DDoS) attack shut down the websites and systems of Minneapolis, but there is no…

5 years ago
Critical flaw in VMware Cloud Director allows hackers to take over company infrastructureCritical flaw in VMware Cloud Director allows hackers to take over company infrastructure

Critical flaw in VMware Cloud Director allows hackers to take over company infrastructure

Researchers disclosed a flaw in VMware Cloud Director platform, tracked as CVE-2020-3956, that could be abused to takeover corporate servers. Security…

5 years ago