US-CERT Vulnerability Summary for the Week of December 25, 2023
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a...
Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled users by tracking...
2023 was a big year for cybersecurity, with significant cyberattacks, data breaches, new threat groups emerging, and, of course, zero-day...
In 2023, we saw numerous law enforcement operations targeting cybercrime operations, including cryptocurrency scams, phishing attacks, credential theft, malware development,...
Security researchers have detailed a new variant of a dynamic link library (DLL) search order hijacking technique that could be...
Security researchers from Ruhr University Bochum have discovered a vulnerability in the Secure Shell (SSH) cryptographic network protocol that could...
A new Go-based malware loader called JinxLoader is being used by threat actors to deliver next-stage payloads such as Formbook...
Japanese game developer Ateam has proven that a simple Google Drive configuration mistake can result in the potential but unlikely...
Researchers have created a decryptor that exploits a flaw in Black Basta ransomware, allowing victims to recover their files for...
Cybersecurity researchers are warning about an increase in phishing attacks that are capable of draining cryptocurrency wallets. "These threats are...
Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps such as Salesforce, Hubspot, Outreach,...
Two not-for-profit hospitals in New York are seeking a court order to retrieve data stolen in an August ransomware attack...
Downfall, a fan expansion for the popular Slay the Spire indie strategy game, was breached on Christmas Day to push...
It's been a quiet week, with even threat actors appearing to take some time off for the holidays. We did...
Multiple information-stealing malware families are abusing an undocumented Google OAuth endpoint named "MultiLogin" to restore expired authentication cookies and log...
Apache has released updates addressing a critical vulnerability (CVE-2023-51467) in their OFBiz Enterprise Resource Planning (ERP) system. The vulnerability has...
The Assembly of the Republic of Albania and telecom company One Albania have been targeted by cyber attacks, the country's...
Nation-state actors affiliated to North Korea have been observed using spear-phishing attacks to deliver an assortment of backdoors and tools...
Apache has released updates addressing a critical vulnerability (CVE-2023-51467) in their OFBiz Enterprise Resource Planning (ERP) system. The vulnerability has...
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign orchestrated by the Russia-linked APT28...
Microsoft on Thursday said it's once again disabling the ms-appinstaller protocol handler by default following its abuse by multiple threat...
Parking app developer EasyPark has published a notice on its website warning of a data breach it discovered on December...
Risk and financial advisory company Kroll has released additional details regarding the August data breach, which exposed the personal information...