Security Affairs

JekyllBot:5 flaws allow hacking TUG autonomous mobile robots in hospitals

Researchers discovered five vulnerabilities that can be exploited to remotely hack hospital Aethon’s TUG autonomous mobile robots. Researchers at healthcare…

4 years ago

EU officials were targeted with Israeli surveillance software

According to a report published by Reuters, an Israeli surveillance software was used to spy on senior officials in the…

4 years ago

Microsoft Partch Tuesday for April 2022 fixed 10 critical vulnerabilities

Microsoft Partch Tuesday security updates for April 2022 fixed 128 vulnerabilities, including an actively exploited zero-day reported by NSA. Microsoft…

4 years ago

Operation TOURNIQUET: Authorities shut down dark web marketplace RaidForums

The dark web marketplace RaidForums has been shut down and its infrastructure seized as a result of Operation TOURNIQUET. The…

4 years ago

Russia-linked Sandworm APT targets energy facilities in Ukraine with wipers

Russia-linked Sandworm APT group targeted energy facilities in Ukraine with INDUSTROYER2 and CADDYWIPER wipers. Russia-linked Sandworm threat actors targeted energy…

4 years ago

NGINX project maintainers fix flaws in LDAP Reference Implementation

The maintainers of the NGINX web server project addressed a zero-day vulnerability in the Lightweight Directory Access Protocol (LDAP) Reference…

4 years ago

CISA adds WatchGuard flaw to its Known Exploited Vulnerabilities Catalog

The U.S. CISA added the CVE-2022-23176 flaw in WatchGuard Firebox and XTM appliances to its Known Exploited Vulnerabilities Catalog. The U.S.…

4 years ago

Anonymous hacked Russia’s Ministry of Culture and leaked 446 GB

The Anonymous collective has hacked Russia's Ministry of Culture and leaked 446 GB of data through the DDoSecrets platform. Data…

4 years ago

FFDroider, a new information-stealing malware disguised as Telegram app

Cybersecurity researchers spotted a new Windows information-stealing malware, named FFDroider, designed to steal credentials and cookies. Cybersecurity researchers from Zscaler…

4 years ago

Dependency Review GitHub Action prevents adding known flaws in the code

Dependency Review GitHub Action scans users' pull requests for dependency changes and will raise an error if any new dependencies…

4 years ago

This website uses cookies.