LibreOffice fixed 3 flaws, including a code execution issue
LibreOffice maintainers addressed three security flaws in their productivity software, including an arbitrary code execution issue. LibreOffice is an open-source office...
LibreOffice maintainers addressed three security flaws in their productivity software, including an arbitrary code execution issue. LibreOffice is an open-source office...
Threat actors are devising new attack tactics in response to Microsoft’s decision to block Macros by default. In response to...
ENISA published a report that includes anonymised and aggregated information about major telecom security incidents in 2021. ENISA published a...
Microsoft linked a private-sector offensive actor (PSOA) to attacks using multiple zero-day exploits for its Subzero malware. The Microsoft Threat...
In the weeks since the Supreme Court of the United States removed a nationwide right to choose to have an...
An anti-vax dating site has been revealed as shockingly easy to compromise by security researchers. Many major aspects of the...
T-Mobile has agreed to pay $350 million to settle class action claims related to a 2021 cyberattack which impacted around...
The Spanish police arrested two individuals accused to have hacked the country’s radioactivity alert network (RAR) in 2021. The Spanish...
A vulnerability affecting open source e-commerce platform PrestaShop could spell trouble for servers running PrestaShop websites. The 15-year-old organisation’s platform...
Threat actors are increasingly abusing Internet Information Services (IIS) extensions to maintain persistence on target servers. Microsoft warns of threat...
Researchers uncovered an ongoing operation, codenamed DUCKTAIL that targets Facebook Business and Ad Accounts. Researchers from WithSecure (formerly F-Secure Business)...
Researchers found similarities between LockBit 3.0 ransomware and BlackMatter, which is a rebranded variant of the DarkSide ransomware. Cybersecurity researchers have...
It wasn’t so long ago that we were wondering what improvements Windows 11 would make in the security stakes. Well,...
Streamlining and enhancing security in the cloud with AWS and Trend Micro If you like the site, please consider joining...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The U.S. State Department increased rewards for information on any North Korea-linked threat actors to $10 million. In April 2020,...
Qakbot malware operators are using the Windows Calculator to side-load the malicious payload on target systems. Security expert ProxyLife and Cyble...
Researchers at Intezer have published a technical analysis of Lightning Framework, a previously undocumented and undetected Linux threat. Lightning is...
Bad news for players of long-time virtual pet management title Neopets. Word is spreading of a compromise claimed to have...
Thera actors are exploiting a zero-day vulnerability to steal payment information from sites using the open source e-commerce platform PrestaShop. Threat actors are...
Introduction Rootkits are malware implants which burrow themselves in the deepest corners of the operating system. Although on paper they...
Kaspersky uncovered a new UEFI firmware rootkit, tracked as CosmicStrand, which it attributes to an unknown Chinese-speaking threat actor. Researchers...
In June 2022, LockBit revealed version 3.0 of its ransomware. In this blog entry, we discuss the findings from our...
Multiple flaws in FileWave mobile device management (MDM) product exposed organizations to cyberattacks. Claroty researchers discovered two vulnerabilities in the...