US-CERT Vulnerability Summary for the Week of April 24, 2023
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Various sectors in East Asian markets have been subjected to a new email phishing campaign that distributes a previously undocumented...
The North Korean state-sponsored threat actor known as Kimsuky has been discovered using a new reconnaissance tool called ReconShark as...
PHP software package repository Packagist revealed that an "attacker" gained access to four inactive accounts on the platform to hijack...
Third-party apps such as Google Analytics, Meta Pixel, HotJar, and JQuery have become critical tools for businesses to optimize their...
Italian corporate banking clients are the target of an ongoing financial fraud campaign that has been leveraging a new web-inject...
Cisco has warned of a critical security flaw in SPA112 2-Port Phone Adapters that it said could be exploited by...
A new Android subscription malware named Fleckpe has been unearthed on the Google Play Store, amassing more than 620,000 downloads...
Before the online market picked up, companies and small retailers always prioritized the customer experience in their stores. The more...
The Avos ransomware gang hijacked Bluefield University's emergency broadcast system, "RamAlert," to send students and staff SMS texts and email...
The North Korean Kimsuky hacking group has been observed employing a new version of its reconnaissance malware, now called 'ReconShark,'...
If you are concerned about the security and privacy of your online activities, this new 50% off Malwarebytes deal can bring you...
A new Android subscription malware named 'Fleckpe' has been spotted on Google Play, the official Android app store, disguised as...
Cisco has disclosed a vulnerability in the web-based management interface of Cisco SPA112 2-Port Phone Adapters, allowing an unauthenticated, remote...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Cybersecurity researchers have found a way to exploit a recently disclosed critical flaw in PaperCut servers in a manner that...
Three new security flaws have been disclosed in Microsoft Azure API Management service that could be abused by malicious actors...
IT and cybersecurity teams are so inundated with security notifications and alerts within their own systems, it's difficult to monitor...
Meta said it took steps to take down more than 1,000 malicious URLs from being shared across its services that...
Three different threat actors leveraged hundreds of elaborate fictitious personas on Facebook and Instagram to target individuals located in South...
Pediatric mental health provider Brightline is warning patients that it suffered a data breach impacting 783,606 people after a ransomware...
Google is rolling out support for passkeys for Google Accounts across all services and platforms, allowing users to sign into...
A researcher hijacked over a dozen Packagist packages—with some having been installed hundreds of millions of times over the course...
The Russian 'Sandworm' hacking group has been linked to an attack on Ukrainian state networks where WinRar was used to...