US-CERT Vulnerability Summary for the Week of April 24, 2023
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Are you concerned about ransomware attacks? You're not alone. In recent years, these attacks have become increasingly common and can...
The suspected Pakistan-aligned threat actor known as SideCopy has been observed leveraging themes related to the Indian military research organization...
The threat actors behind the ransomware attack on Taiwanese PC maker MSI last month have leaked the company's private code...
Digital storage giant Western Digital confirmed that an "unauthorized third party" gained access to its systems and stole personal information...
Threat hunting is an essential component of your cybersecurity strategy. Whether you're getting started or in an advanced state, this...
An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in the form of a...
A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of “large...
Finish newspaper Helsinin Sanomat has created a custom Counter-Strike: Global Offensive (CS:GO) map explicitly made to bypass Russian news censorship...
Western Digital has taken its store offline and sent customers data breach notifications after confirming that hackers stole sensitive personal...
The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A new proof-of-concept (PoC) exploit for an actively exploited PaperCut vulnerability was released that bypasses all known detection rules. The PaperCut...
Twitter disclosed that a 'security incident' caused private tweets sent to Twitter Circles to show publicly to users outside of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity to its...
PHP software package repository Packagist revealed that an "attacker" gained access to four inactive accounts on the platform to hijack...
Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a...
This week's ransomware news has been dominated by a Royal ransomware attack on the City of Dallas that took down...
Canadian diversified software company Constellation Software confirmed on Thursday that some of its systems were breached by threat actors who...
Android security updates released this month patch a high-severity vulnerability exploited as a zero-day to install commercial spyware on compromised...
Security researchers warn that the 'Advanced Custom Fields' and 'Advanced Custom Fields Pro' WordPress plugins, with millions of installs, are...
A new Android malware called 'FluHorse' has been discovered, targeting users in Eastern Asia with malicious apps that imitate legitimate...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...