Fewer Than 100 Scammers Responsible For Global Email Extortion
Global email-based extortion scams are the work of just a small group of fraudsters, new research from Barracuda Networks has...
Global email-based extortion scams are the work of just a small group of fraudsters, new research from Barracuda Networks has...
This year could be another record breaker for data compromise following 951 publicly reported incidents in the second quarter, a...
The White House has published a plan for the implementation of the US National Cybersecurity Strategy, which was introduced in...
Drawing on its tracking of Russia-backed disruptive operations against Ukraine since the country’s invasion of its neighbor in February 2022,...
A leading UK security agency has revealed several approaches that could reduce or eliminate the need for organizations to run...
A new version of the Common Vulnerability Scoring System (CVSS 4.0) has been unveiled publicly by the Forum of Incident...
Global financial services organizations have lost over $32bn in downtime since 2018 due to ransomware breaches, a new report has...
The UK’s financial services regulator has warned banks that it will be watching closely what steps they put in place...
Trend Micro has discovered a sample of Shadowpad, a sophisticated backdoor used by various Chinese-sponsored threat actors, in an application...
A generative AI tool, WormGPT, has emerged as a powerful weapon in the hands of cyber-criminals, specifically for launching business...
Windows users have been targeted again by the sophisticated malware known as LokiBot, which is spreading through malicious Office documents. According...
A new threat actor group has been observed conducting a series of cyber-attacks targeting government entities, military organizations and civilian...
NAME__________Honeywell Experion PKS, LX, and PlantCruise denial of servicePlatforms Affected:Honeywell Experion LX Honeywell Experion PKS Honeywell Experion PlantCruiseRisk Level:7.5Exploitability:UnprovenConsequences:Denial of...
NAME__________Kofax Power PDF buffer overflowPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF is vulnerable to a heap-based buffer overflow,...
NAME__________Kofax Power PDF information disclosurePlatforms Affected:Kofax Power PDFRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Kofax Power PDF could allow a remote attacker to obtain...
NAME__________Kofax Power PDF information disclosurePlatforms Affected:Kofax Power PDFRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Kofax Power PDF could allow a remote attacker to obtain...
NAME__________Kofax Power PDF buffer overflowPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF is vulnerable to a stack-based buffer overflow,...
NAME__________Kofax Power PDF information disclosurePlatforms Affected:Kofax Power PDFRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Kofax Power PDF could allow a remote attacker to obtain...
NAME__________Kofax Power PDF code executionPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF could allow a remote attacker to execute...
NAME__________Kofax Power PDF buffer overflowPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF is vulnerable to a heap-based buffer overflow,...
NAME__________Kofax Power PDF information disclosurePlatforms Affected:Kofax Power PDFRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Kofax Power PDF could allow a remote attacker to obtain...
NAME__________Kofax Power PDF code executionPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF could allow a remote attacker to execute...
NAME__________Kofax Power PDF code executionPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF could allow a remote attacker to execute...
NAME__________Kofax Power PDF code executionPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF could allow a remote attacker to execute...