US-CERT Vulnerability Summary for the Week of March 27, 2023
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info grinnellplans -- grinnellplans A vulnerability...
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info grinnellplans -- grinnellplans A vulnerability...
Clouded vision# CTI systems are confronted with some major issues ranging from the size of the collection networks to their...
A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of...
Critical infrastructure attacks are a preferred target for cyber criminals. Here's why and what's being done to protect them. What...
The developers of the Typhon info-stealer announced on a dark web forum that they have updated the malware to a...
A new dark web marketplace called STYX launched earlier this year and appears to be on its way to becoming a...
The police in Spain have arrested José Luis Huertas (aka "Alcaseca", "Mango", “chimichuri”), a 19-year-old regarded as the most dangerous...
Multiple vulnerabilities discovered Nexx smart devices can be exploited to control garage doors, disable home alarms, or smart plugs. There are...
Biometric authentication is often thought of as nearly impossible to steal or fake, a perfect addition to your cybersecurity arsenal....
Clouded vision# CTI systems are confronted with some major issues ranging from the size of the collection networks to their...
Google is enacting a new data deletion policy for Android apps that allow account creation to also offer users with...
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info grinnellplans -- grinnellplans A vulnerability...
A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think tanks, policy makers,...
An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent backdoor access to...
Clouded vision# CTI systems are confronted with some major issues ranging from the size of the collection networks to their...
Portuguese users are being targeted by a new malware codenamed CryptoClippy that's capable of stealing cryptocurrency as part of a...
The threat actor behind the information-stealing malware known as Typhon Reborn has resurfaced with an updated version (V2) that packs...
Every year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the impact of viruses,...
Clouded vision# CTI systems are confronted with some major issues ranging from the size of the collection networks to their...
The domains for Genesis Market, one of the most popular marketplaces for stolen credentials of all types, were seized by...
HP announced in a security bulletin this week that it would take up to 90 days to patch a critical-severity...
eFile.com, an IRS-authorized e-file software service provider used by many for filing their tax returns, has been caught serving JavaScript...
An ALPHV/BlackCat ransomware affiliate was observed exploiting three vulnerabilities impacting the Veritas Backup product for initial access to the target network. The...
Following a cyberattack on a U.S.-based company, malware researchers discovered what appears to be a new ransomware strain with "technically unique features,"...