Citrix and NSA urge admins to fix actively exploited zero-day in Citrix ADC and Gateway
Citrix urges customers to update their installs to fix actively exploited zero-day (CVE-2022-27518) in Citrix ADC and Gateway. Citrix urges...
Citrix urges customers to update their installs to fix actively exploited zero-day (CVE-2022-27518) in Citrix ADC and Gateway. Citrix urges...
LockBit ransomware gang hacked the California Department of Finance and threatens to leak data stolen from its systems. The LockBit...
A new Python backdoor is targeting VMware ESXi servers, allowing attackers to take over compromised systems. Juniper Networks researchers spotted...
Twitter confirmed that the recent leak of members’ profile information resulted from the 2021 data breach disclosed in August 2022....
We intercepted a cryptocurrency mining attack that incorporated an advanced remote access trojan (RAT) named the CHAOS Remote Administrative Tool....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Fortinet fixed an actively exploited FortiOS SSL-VPN flaw that could allow a remote, unauthenticated attacker to execute arbitrary code on devices....
The Cybernews research team reported that India’s government platform Global Pravasi Rishta Portal was leaking sensitive user data. Original post...
Researchers spotted a cryptocurrency mining campaign targeting Linux users with Go-based CHAOS malware (Trojan.Linux.CHAOSRAT). In November 2022, Trend Micro researchers...
A hack-for-hire group dubbed Evilnum is targeting travel and financial entities with the new Janicab malware variant. Kaspersky researchers reported that...
Researchers reported an increase in TrueBot infections, attackers have shifted from using malicious emails as their primary delivery method to other techniques....
The Pwn2Own Toronto 2022 is ended, and the participants earned a total of $989,750 for 63 unique zero-day exploits. The...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The Iran-linked MuddyWater APT is targeting countries in the Middle East as well as Central and West Asia in a new campaign....
Censys researchers warn of more than 4,000 vulnerable Pulse Connect Secure hosts exposed to the Internet. Pulse Connect Secure is a...
The US Department of Health and Human Services (HHS) warns healthcare organizations of Royal ransomware attacks. The human-operated Royal ransomware...
Getting started with Ghidra For about two decades, being a reverse engineer meant that you had to master the ultimate...
Just to clarify, the above subheading isn’t a normal quote, but a message that Janicab malware attempted to decode in...
Explore the world of zero-day threats and gain valuable insight into the importance of proactive detection and remediation. Learn how...
CommonSpirit Health confirmed that the October security breach resulted in the exposure of the personal data of 623,774 patients. In...
On the third day of the Zero Day Initiative’s Pwn2Own Toronto 2022 hacking competition, participants earned more than $250,000. On the third...
Cisco disclosed a high-severity flaw in its IP phones that can be exploited to gain remote code execution and conduct...
Claroty researchers devised a technique for bypassing the web application firewalls (WAF) of several vendors. Researchers at industrial and IoT...
Cybersecurity insurance is a must have for organizations of any size. John Hennessy, RVP at Cowbell discusses cyber insurance policy...