Apple Products Remote Code Execution Vulnerability
A vulnerability was identified in Apple Products. A remote attacker could exploit this vulnerability to trigger remote code execution on...
A vulnerability was identified in Apple Products. A remote attacker could exploit this vulnerability to trigger remote code execution on...
Description of Problem Multiple vulnerabilities have been discovered in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway)....
CISA ordered federal agencies to mitigate remote code execution zero-days affecting Windows and Office products that were exploited by the Russian-based...
A critical design flaw in the Google Cloud Build service discovered by cloud security firm Orca Security can let attackers...
A new cybersecurity certification and labeling program called U.S. Cyber Trust Mark is being shaped to help U.S. consumers choose...
Citrix today is alerting customers of a critical-severity vulnerability (CVE-2023-3519) in NetScaler ADC and NetScaler Gateway that already has exploits...
Cybersecurity vendor Sophos is being impersonated by a new ransomware-as-a-service called SophosEncrypt, with the threat actors using the company name...
The global cyber insurance market is expected to reach over $20 billion by 2025. However, many organizations are finding it...
A financially motivated cybercrime gang has been observed deploying BlackCat ransomware payloads on networks backdoored using a revamped Sardonic malware...
A former IT security analyst has been jailed for three years and seven months after attempting to extort his employer,...
Security researchers have recorded over one million attempts to compromise a popular WordPress plugin over the past few days.Wordfence said...
A suspected scammer who used scareware to trick hundreds of thousands of global victims into handing over money has been...
Security researchers from Rapid7 have found active exploitation of multiple vulnerabilities in Adobe ColdFusion, a web development computing platform.On July...
Identity and access management solutions provider JumpCloud has revealed on July 12, 2023, that it was the target of a security...
Threat actors have extensively been using a sophisticated web-inject kit called drIBAN to orchestrate fraudulent attacks on corporate banking institutions...
The US Cybersecurity and Infrastructure Security Agency (CISA) has released a comprehensive factsheet on July 17, 2023, to assist businesses...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoelra -- parkmatikImproper Neutralization of Special Elements used in an SQL Command...
US-based enterprise software firm JumpCloud says a state-backed hacking group breached its systems almost one month ago as part of...
The new NoEscape ransomware operation is believed to be a rebrand of Avaddon, a ransomware gang that shut down and...
Mark your calendar for mWISE™, the uniquely targeted, community-focused cybersecurity conference from Mandiant. It runs from September 18–20, 2023 in...
The Spanish National Police has apprehended a Ukrainian national wanted internationally for his involvement in a scareware operation spanning from...
28-year-old Ashley Liles, a former IT employee, has been sentenced to over three years in prison for attempting to blackmail...
Update 7/17/23: The article was updated due to a mistaken warning added by Adobe to its email notification. However, a...
Hackers are conducting widespread exploitation of a critical WooCommerce Payments plugin to gain the privileges of any users, including administrators,...