Security Affairs

Attackers exploited a zero-day in Mitel VOIP devices to compromise a network

Experts warn threat actors have exploited a zero-day vulnerability in a Mitel VoIP appliance in a ransomware attack. CrowdStrike researchers…

4 years ago

Vulnerabilities in the Jacuzzi SmartTub app could allow to access users’ data

Researchers discovered multiple vulnerabilities in Jacuzzi SmartTub app web interface that can expose private data. Multiple vulnerabilities in Jacuzzi SmartTub…

4 years ago

Google TAG argues that Italian surveillance firm RCS Labs was helped by ISPs to infect mobile users

Google's Threat Analysis Group (TAG) revealed that the Italian spyware vendor RCS Labs was supported by ISPs to spy on…

4 years ago

Chinese Tropic Trooper APT spreads a hacking tool laced with a backdoor

China-linked APT group Tropic Trooper has been spotted previously undocumented malware written in Nim language. Check Point Research uncovered an activity…

4 years ago

NSO Group told lawmakers that Pegasus spyware was used by at least 5 European countries

The Israeli surveillance firm NSO Group revealed that its Pegasus spyware was used by at least five European countries. The…

4 years ago

QNAP warns of a critical PHP flaw that could lead to remote code execution

Taiwanese company QNAP is addressing a critical PHP vulnerability that could be exploited to achieve remote code execution. Taiwanese vendor…

4 years ago

Researchers found flaws in MEGA that allowed to decrypt of user data

Researchers at ETH Zurich discovered several critical flaws in the MEGA cloud storage service that could have allowed the decryption…

4 years ago

Exclusive: Lithuania under cyber-attack after the ban on Russian railway goods

Cyber Spetsnaz is targeting government resources and critical infrastructure in Lithuania after the ban of Russian railway goods Cyber Spetsnaz…

4 years ago

Thank you!!! SecurityAffairs awarded as Best European Personal Cybersecurity Blog 2022

I’m proud to announce that SecurityAffairs was awarded as the Best European Personal Cybersecurity Blog 2022 at European Cybersecurity Blogger Awards 2022.…

4 years ago

Crooks are using RIG Exploit Kit to push Dridex instead of Raccoon stealer

Threat actors are using the Rig Exploit Kit to spread the Dridex banking trojan instead of the Raccoon Stealer malware.…

4 years ago

This website uses cookies.