Security News

F5 fixed 2 high-severity Remote Code Execution bugs in its products

Researchers at cybersecurity firm Rapid7 have identified several vulnerabilities and other potential security issues affecting F5 products. Rapid7 researchers discovered…

3 years ago

Lazarus APT uses DTrack backdoor in attacks against LATAM and European orgs

North Korea-linked Lazarus APT is using a new version of the DTrack backdoor in attacks aimed at organizations in Europe…

3 years ago

New RapperBot Campaign targets game servers with DDoS attacks

Fortinet researchers discovered new samples of RapperBot used to build a botnet to launch Distributed DDoS attacks against game servers.…

3 years ago

Beginning 2023 Google plans to rollout the initial Privacy Sandbox Beta

Google announced it will roll out the Privacy Sandbox system for Android in beta to a limited number of Android…

3 years ago

Experts found critical RCE in Spotify’s Backstage

Researchers discovered a critical vulnerability impacting Spotify's Backstage Software Catalog and Developer Platform. Researchers from the security firm Oxeye discovered…

3 years ago

Experts revealed details of critical SQLi and access issues in Zendesk Explore

Researchers disclosed technical details of critical SQLi and access vulnerabilities in the Zendesk Explore Service. Cybersecurity researchers at Varonis disclosed…

3 years ago

China-linked APT Billbug breached a certificate authority in Asia

A suspected China-linked APT group breached a digital certificate authority in Asia as part of a campaign aimed at government…

3 years ago

Google to Pay a record $391M fine for misleading users about the collection of location data

Google is going to pay $391.5 million to settle with 40 states in the U.S. for secretly collecting personal location…

3 years ago

Previously undetected Earth Longzhi APT group is a subgroup of APT41

Trend Micro reported that the Earth Longzhi group, a previously undocumented subgroup of APT41, targets Ukraine and Asian Countries. Early this…

3 years ago

Avast details Worok espionage group’s compromise chain

Cyber espionage group Worok abuses Dropbox API to exfiltrate data via using a backdoor hidden in apparently innocuous image files. Researchers…

3 years ago

This website uses cookies.