Security Affairs newsletter Round 322
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box.
If you want to also receive for free the international press subscribe here.
Coop supermarket closes hundreds of stores after Kaseya supply chain ransomware attack |
Hackers spread backdoor after compromising the Mongolian CA MonPass |
REvil gang exploited a zero-day in the Kaseya supply chain attack |
REvil ransomware gang demanded $70M for universal decryptor for Kaseya victims |
Revil ransomware gang hit Spanish telecom giant MasMovil |
SonicWall addresses critical CVE-2021-20026 flaw in NSM devices |
WildPressure APT expands operations targeting the macOS platform |
Wiregrass Electric Cooperative hit by a ransomware attack |
Experts bypassed Microsofts emergency patch for the PrintNightmare |
Hacker deposited $1M in a popular cybercrime marketplace to buy zero-day exploits |
Morgan Stanley discloses data breach after the hack of a third-party vendor |
Multiple Sage X3 vulnerabilities expose systems to hack |
Tor Browser 10.5 is out, it includes a new anti-censorship feature |
Hackers use a new technique in malspam attacks to disable Macro security warnings in weaponized docs |
Hackers use a new technique in phishing attacks to disable Macro security warnings in weaponized docs |
Insurance firm CNA discloses data breach after March ransomware attack |
Microsoft says that the emergency patch recently released correctly fix the PrintNightmare flaw |
Irans railroad system was hit by a cyberattack, hackers posted fake delay messages |
Kaseya warns customers of ongoing malspam campaign posing as security updates |
If you want to also receive for free the international press subscribe here.
Follow me on Twitter: @securityaffairs and Facebook
|
Pierluigi Paganini
(SecurityAffairs – hacking, newsletter)
The post Security Affairs newsletter Round 322 appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.