UK Privacy Regulator Issues Black Friday Smart Device Warning
The Information Commissioner’s Office (ICO) has urged shoppers to investigate the privacy and security credentials of any smart technologies they’re...
The Information Commissioner’s Office (ICO) has urged shoppers to investigate the privacy and security credentials of any smart technologies they’re...
Microsoft has released fixes for five zero-day vulnerabilities in its monthly update round, three of which are being actively exploited...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
Description of Problem An issue has been discovered that affects Citrix Hypervisor 8.2 CU1 LTSR and may allow malicious privileged...
Postmeds, doing business as ‘Truepill,’ is sending notifications of a data breach informing recipients that threat actors accessed their sensitive...
It’s not every day that you discover a new Russian hacking group complete with a song and dance routine (performed...
The Lockbit ransomware attacks use publicly available exploits for the Citrix Bleed vulnerability (CVE-2023-4966) to breach the systems of large...
VMware disclosed a critical and unpatched authentication bypass vulnerability affecting Cloud Director appliance deployments. Cloud Director enables VMware admins to...
A new software-based fault injection attack, CacheWarp, can let threat actors hack into AMD SEV-protected virtual machines by targeting memory writes...
Intel has fixed a high-severity CPU vulnerability in its modern desktop, server, mobile, and embedded CPUs, including the latest Alder...
The WordPress plugin WP Fastest Cache is vulnerable to an SQL injection vulnerability that could allow unauthenticated attackers to read the contents...
The U.S. Department of Justice announced today that Federal Bureau of Investigation took down the network and infrastructure of a botnet...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesBrowser Medium RiskRemote Code Execution Elevation of Privilege Spoofing Azure Medium...
The UK’s critical infrastructure (CNI) providers face a persistent and critical threat from emboldened state-backed and aligned actors, a leading...
Security researchers have discovered a total of 3938 unique secrets on PyPI, the official third-party package management system for the...
Cyber-criminals have been observed disabling or wiping out logs in 82% of incidents. The findings come from the latest report from...
The Royal ransomware group has targeted more than 350 global victims since September 2022, demanding hundreds of millions in ransom...
A Middle Eastern advanced persistent threat (APT) group launched a new series of targeted cyber-espionage attacks from July to October...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps such as Salesforce, Hubspot, Outreach,...
The Vietnamese threat actors behind the Ducktail stealer malware have been linked to a new campaign that ran between March...
Criminal IP, a prominent Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently integrated with Cisco SecureX/XDR,...
The FBI and CISA revealed in a joint advisory that the Royal ransomware gang has breached the networks of at...
CISA warned federal agencies today to secure Juniper devices on their networks by Friday against four vulnerabilities now used in remote...