CISA orders federal agencies to patch CVE-2022-26925 by July 22
US Critical Infrastructure Security Agency (CISA) adds CVE-2022-26925 Windows LSA flaw to its Known Exploited Vulnerabilities Catalog. In May the...
US Critical Infrastructure Security Agency (CISA) adds CVE-2022-26925 Windows LSA flaw to its Known Exploited Vulnerabilities Catalog. In May the...
Jenkins security team disclosed tens of flaws affecting 29 plugins for the Jenkins automation server, most of them are yet...
Microsoft announced that the Windows worm Raspberry Robin has already infected the networks of hundreds of organizations. Raspberry Robin is...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
Google Project Zero states that in H1 2022 at least half of zero-day issues exploited in attacks were related to...
This is a transcription of an interview I had at Iran International broadcaster, I discussed about the role of social...
Researchers shared technical details and proof-of-concept exploit code for the CVE-2022-28219 flaw in Zoho ManageEngine ADAudit Plus tool. Security researchers...
A cyber attack forced the American publishing giant Macmillan to shut down its IT systems. The publishing giant Macmillan has...
Researchers warn of a new ‘SessionManager’ Backdoor that was employed in attacks targeting Microsoft IIS Servers since March 2021. Researchers...
Microsoft spotted a cloud threat actor tracked as 8220 that is now targeting Linux servers in a long-running cryptomining campaign....
Researchers have analysed a campaign leveraging infected SOHO routers to target predominantly North American and European networks of interest. The...
The popular malware Raccoon stealer, which suspended operations after a developer allegedly died in the Ukraine invasion, has returned. Raccoon...
Organisations working in the immigration sector are advised to be on high alert for Advanced Persistent Threat (APT) attacks. Bleeping...
Norway’s National Security Authority (NSM) confirmed that a DDoS attack took down some of the country’s most important websites. Norway’s...
Following on from our earlier Owowa discovery, we continued to hunt for more backdoors potentially set up as malicious modules...
Good news for the victims of the Hive ransomware, Korean security researchers have released a free decryptor for some versions....
We look into a recent attack orchestrated by the Black Basta ransomware ransomware group that used the banking trojan QakBot...
While DevOps and site reliability engineering teams often work together and have shared goals, there are important distinctions between the...
North Korea-linked Lazarus APT group is suspected to be behind the recent hack of the Harmony Horizon Bridge. Recently, threat...
A former Canadian government IT worker admitted to being a high-level member of the Russian cybercrime group NetWalker. A former...
Researchers detailed a new information-stealing malware, dubbed YTStealer, that targets YouTube content creators. Intezer cybersecurity researchers have detailed a new...
Trend Micro Security Researcher, Erin Sindelar, breaks down three popular types of cloud risk assessments to help CISOs and security...
Researchers discovered a new flaw in RARlab’s UnRAR utility, tracked CVE-2022-30333, that can allow to remotely hack Zimbra Webmail servers....
The MITRE organization published the 2022 CWE Top 25 most dangerous software weaknesses. The MITRE shared the list of the 2022 top...