RDP, the ransomware problem that won’t go away
The year 2020 will certainly be remembered as one of the most difficult and tragic years humankind has faced in...
The year 2020 will certainly be remembered as one of the most difficult and tragic years humankind has faced in...
In a collaboration between French and Ukranian law enforcement, arrests have been made that might put a dent in one...
Last year, threat actors took advantage of the COVID-19 public health crisis in a way previously considered unimaginable, not only...
 After targeting the German users in the ongoing Facebook phishing campaign threat actors have shifted their focus onto the British...
 Details of a series of bugs in Palo Alto Firewall Software, which the network provider addressed last September, were revealed...
News overview Cybercriminals are constantly on the lookout for means and methods to make attacks more destructive. In Q4Â 2020, Citrix...
InsightIDR was built in the cloud to support dynamic and rapidly changing environments—including remote workers, hybrid cloud and on-premises architectures,...
Researchers from threat intelligence Cyble have discovered threat actors abusing the Ngrok platform in a fresh phishing campaign. Researchers at...
Multiple vulnerabilities in the popular file-sharing app SHAREit have yet, to be addressed, experts from Trend Micro warned. SHAREit is...
Experts discovered a new Bluetooth overlay skimmer that interferes with the ability of the terminal to read chip-based cards, forcing...
VMware released security patches for a potentially serious vulnerability affecting the vSphere Replication product. VMware has recently released security patches...
French agency ANSSI attributes a series of attacks targeting Centreon servers to the Russia-linked Sandworm APT group. The French security...
Summary: Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility...
Summary: An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading...
Summary: Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before...
Summary: In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This...
Summary: A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP1 Update 1), SINEMA Server (All versions...
In May 2017, the file sharing platform Ge.tt suffered a data breach. The data was subsequently put up for sale...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
The UK’s National Crime Agency (NCA)—working alongside the US Secret Service, Homeland Security, the FBI, Europol, and the District Attorney’s...
 Russian internet and search organization Yandex declared on Friday that one of its system administrators had enabled unapproved access to...
A court in the United States has sentenced Ukrainian citizen Alexander Musienko to more than seven years in prison for...
 Mutuelle Nationale des Hospitaliers (MNH), a French health insurance company has been hit by a ransomware attack that has severely...
 The PayPal currency converter functionality was damaged by severe cross-site scripting (XSS) vulnerability. An attacker might be able to run...