[ad_1] On Thursday, the US Cybersecurity and Infrastructure Security Agency (CISA) added six more security flaws to its list of known exploited vulnerabilities (KEVs). Three of them were exploited by Russian cyber spies APT28 to hack Roundcube mail servers belonging…
blog
[ad_1] Microsoft says Linux and Internet of Things (IoT) devices exposed to the Internet are being hijacked in brute force attacks as part of a recently observed cryptojacking campaign. After gaining access to a system, attackers deploy an OpenSSH package…
[ad_1] VMware has patched several very serious security vulnerabilities in vCenter Server, which may allow attackers to obtain code execution and bypass authentication on unpatched systems. vCenter Server is VMware's vSphere Suite control center and server management solution that helps…
[ad_1] Millions of GitHub repositories may be vulnerable to dependency repository hijacking, also known as "RepoJacking", which could help attackers deploy supply chain attacks affecting large numbers of users. The warning comes from The AquaSec Security Team"Nautilus", which analyzed a…
[ad_1] DuckDuckGo has released its privacy-centric browser for Windows to the general public. This is a beta version available for download without any restrictions. DuckDuckGo's web browser promises to protect users from third-party tracking, targeted advertising, logging of search queries,…
[ad_1] Multinational shipping company UPS is warning its Canadian customers that some of their personal information may have been exposed through its online package finder tools and misused in phishing attacks. At first glance, the letters sent by UPS Canada,…
[ad_1] Car holder and mobile accessories maker iOttie warns that its site has been compromised for nearly two months to steal credit cards and personal information from online shoppers. iOttie is a popular manufacturer of car mounts, chargers and accessories…
[ad_1] Proof-of-concept exploit code is now available for a high-severity flaw in Cisco Secure Client for Windows (formerly AnyConnect Secure Mobility Client) software that may allow attackers to elevate privileges to SYSTEM. Cisco Secure Client helps employees work from anywhere…
[ad_1] North Korean hacking group APT37 uses new information-stealing malware 'FadeStealer' containing 'eavesdropping' feature, allowing threat actor to spy and record from microphones the victims. APT37, also known as StarCruft, Reaper or RedEyes, is considered a state-sponsored hacking group with…
[ad_1] Apple patched three new zero-day vulnerabilities exploited in attacks installing triangulation spyware on iPhones via no-click iMessage exploits. "Apple is aware of a report that this issue may have been actively exploited against versions of iOS released prior to…
Recent Posts
- ‘Evil Telegram’ Android apps on Google Play infected 60K with spyware
- Google rolls out Privacy Sandbox to use Chrome browsing history for ads
- Microsoft Teams phishing attack pushes DarkGate malware
- The Week in Ransomware – September 8th 2023
- Notepad++ 8.5.7 released with fixes for four security vulnerabilities
Recent News
-
Hackers steal Steam accounts in new…
September 13, 2022 -
New PsExec spin-off allows hackers to…
September 13, 2022 -
Hackers hack software provider for Magento…
September 13, 2022
Work Together
Let us help you protect your business from all malware, spyware and ransomware attacks.