More than 35,000 Java packages impacted by Log4j flaw, Google warns
Google found more than 35,000 Java packages in the Maven Central repository that are impacted by flaws in the Apache...
Google found more than 35,000 Java packages in the Maven Central repository that are impacted by flaws in the Apache...
Uptycs researchers have observed attacks related to miners, DDOS malware and some variants of ransomware actively leveraging LogforShell flaw in...
DarkWatchman is a new lightweight javascript-based Remote Access Trojan (RAT) that uses novel methods for fileless persistence. Recently Prevailion experts...
The FBI warns that zero-day flaw in Zoho’s ManageEngine Desktop Central has been under active exploitation by nation-state actors since October. The Federal...
Mariana Trench is a security focused The issue tells you that Mariana Trench found a remote code execution in MainActivity.onCreate...
The Belgian defense ministry was hit by a cyber attack, it seems that threat actors exploited the Log4Shell vulnerability. The...
An alleged APT group planted a backdoor in the network of a U.S. federal government commission associated with international rights....
A fully automated, accurate, and extensive scanner for finding DescriptionWe have been researching the Log4J RCE (CVE-2021-44228) since it was...
Security researchers devised a new attack vector exploiting the Log4Shell vulnerability on servers locally by using a JavaScript WebSocket connection....
Detects Log4J versions on your file-system within any application that are vulnerable to CVE-2021-44228 and CVE-2021-45046. It is able to...
Clop ransomware gang stolen confidential data from the UK police and leaked it in the dark web because the victim...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The TellYouThePass ransomware resurged and exploits the Apache Log4j flaw (Log4Shell) to target both Linux and Windows systems. Researchers from...
My Cloud OS firmware is reaching the end of support, Western Digital customers have to update their WD My Cloud...
Multiple flaws in the Log4J library are scaring organizations worldwide while threat actors are already exploiting them. 2.17 is the...
A cyber attack hit four affiliated online sports gear sites and resulted in the theft of credit cards for 1,813,224...
The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware gang is...
VMware released security patches for a critical server-side request forgery (SSRF) vulnerability in Workspace ONE UEM console. VMware has addressed...
Experts reported the resurgence of the Phorpiex botnet, in one year it allowed to steal crypto assets worth of half...
Tens of thousands of devices worldwide, including many industrial control systems (ICS), have been hit by the PseudoManuscrypt spyware. Kaspersky...
The ImControllerService service of Lenovo laptops is affected by a privilege elevation bug that can allow to execute commands with admin...
Experts warn that threat actors are actively attempting to exploit a second bug disclosed in the popular Log4j logging library. American web...
Nation-state actors from China, Iran, North Korea, and Turkey are attempting to exploit the Log4Shell vulnerability to in attacks in the wild....
Threat actors are using a malicious Internet Information Services (IIS) Server module, dubbed Owowa, to steal Microsoft Exchange credentials. Kaspersky...