SecurityAffairs

Cloud misconfiguration, a major risk for cloud securityCloud misconfiguration, a major risk for cloud security

Cloud misconfiguration, a major risk for cloud security

Misconfigured cloud-based databases continue to cause data breaches, millions of database servers are currently exposed across cloud providers. Fugue’s new State…

4 years ago
FBI shares with HIBP 4 million email addresses involved in Emotet attacksFBI shares with HIBP 4 million email addresses involved in Emotet attacks

FBI shares with HIBP 4 million email addresses involved in Emotet attacks

The FBI has shared with Have I Been Pwned service 4 million email addresses collected by Emotet botnet and employed…

4 years ago
CISA, NIST published an advisory on supply chain attacksCISA, NIST published an advisory on supply chain attacks

CISA, NIST published an advisory on supply chain attacks

CISA and NIST published a report on software supply chain attacks that shed light on the associated risks and provide…

4 years ago
Shlayer macOS malware abuses zero-day to bypass Gatekeeper featureShlayer macOS malware abuses zero-day to bypass Gatekeeper feature

Shlayer macOS malware abuses zero-day to bypass Gatekeeper feature

Apple addresses a zero-day in macOS exploited by Shlayer malware to bypass Apple's security features and deliver second-stage malicious payloads. Apple…

4 years ago
Boffins found a bug in Apple AirDrop that could leak users’ personal infoBoffins found a bug in Apple AirDrop that could leak users’ personal info

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Experts found a bug in Apple's wireless file-sharing protocol Apple AirDrop that could expose user's contact information. Boffins from the…

4 years ago
Bye Bye Emotet, law enforcement pushed the uninstall code via the botnetBye Bye Emotet, law enforcement pushed the uninstall code via the botnet

Bye Bye Emotet, law enforcement pushed the uninstall code via the botnet

European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows…

4 years ago
Prometei botnet is targeting ProxyLogon Microsoft Exchange flawsPrometei botnet is targeting ProxyLogon Microsoft Exchange flaws

Prometei botnet is targeting ProxyLogon Microsoft Exchange flaws

Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts…

4 years ago
A supply chain attack compromised the update mechanism of Passwordstate Password ManagerA supply chain attack compromised the update mechanism of Passwordstate Password Manager

A supply chain attack compromised the update mechanism of Passwordstate Password Manager

The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another…

4 years ago
Hackers are targeting Soliton FileZen file-sharing serversHackers are targeting Soliton FileZen file-sharing servers

Hackers are targeting Soliton FileZen file-sharing servers

Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government…

4 years ago
Security Affairs newsletter Round 311Security Affairs newsletter Round 311

Security Affairs newsletter Round 311

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

4 years ago