Diving into an Old Exploit Chain and Discovering 3 new SIP-Bypass Vulnerabilities
More than two years ago, a researcher, A2nkF demonstrated the exploit chain from root privilege escalation to SIP-Bypass up to...
More than two years ago, a researcher, A2nkF demonstrated the exploit chain from root privilege escalation to SIP-Bypass up to...
We found samples of the Raspberry Robin malware spreading in telecommunications and government office systems beginning September. The main payload...
We discuss the use of the InterPlanetary File System (IPFS) in phishing attacks. If you like the site, please consider...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Microsoft announced that a botnet dubbed MCCrash is launching distributed denial-of-service (DDoS) attacks against private Minecraft servers. Microsoft spotted a...
Microsoft disclosed technical details of a vulnerability in Apple macOS that could be exploited by an attacker to bypass Gatekeeper....
Telling users to ‘avoid clicking bad links’ still isn’t working Let's start with a basic premise: several of the established...
Summary At the end of September, GTSC reported an attack on critical infrastructure that took place in August. During the...
Researchers spotted a malicious package in the Python Package Index (PyPI) repository that impersonates a software development kit (SDK) for...
If a stronger cyber security posture is one of your organization’s new year’s resolutions, focus on what matters with these...
In this blog entry, we discuss the reasons why malicious actors choose to and opt not to pursue kernel-level access...
IT giant Cisco is warning of threat actors exploiting many old vulnerabilities in attacks in the wild. Cisco has updated...
Researchers spotted a new variant of the Agenda ransomware which is written in the cross-platform programming language Rust. Trend Micro...
US government is warning of business email compromise (BEC) attacks aimed at hijacking shipments of food products and ingredients. The...
The Glupteba botnet is back, researchers reported a surge in infection worldwide after Google disrupted its operation in 2021. In...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Google introduces end-to-end encryption for Gmail web to its Workspace and education customers to protect emails sent using the web...
The fire and rescue service in the state of Victoria, Australia, has shut down its network and turned to operating...
Samba released updates to address multiple vulnerabilities that can be exploited to take control of impacted systems. Samba released updates...
This year, various ransomware-as-a-service groups have developed versions of their ransomware in Rust, including Agenda. Agenda's Rust variant has targeted...
An ex Twitter employee has been sentenced to three-and-a-half years in prison for spying on individuals on behalf of Saudi...
Social media analytics service Social Blade disclosed a security breach after a database containing allegedly stolen data from the company...
Gemini crypto exchange warns users of an ongoing phishing campaign after a third-party vendor suffered a security breach. Gemini crypto...
US CISA added two vulnerabilities impacting Veeam Backup & Replication software to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure...